Apr 12 18:22:27.983247 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Apr 12 18:22:27.983290 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:22:27.983315 kernel: efi: EFI v2.70 by EDK II Apr 12 18:22:27.983332 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x7174cf98 Apr 12 18:22:27.983346 kernel: ACPI: Early table checksum verification disabled Apr 12 18:22:27.983361 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Apr 12 18:22:27.983377 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Apr 12 18:22:27.983393 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Apr 12 18:22:27.983407 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Apr 12 18:22:27.983421 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Apr 12 18:22:27.983441 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Apr 12 18:22:27.983455 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Apr 12 18:22:27.983469 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Apr 12 18:22:27.983484 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Apr 12 18:22:27.983501 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Apr 12 18:22:27.983521 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Apr 12 18:22:27.983536 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Apr 12 18:22:27.983551 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Apr 12 18:22:27.983566 kernel: printk: bootconsole [uart0] enabled Apr 12 18:22:27.983581 kernel: NUMA: Failed to initialise from firmware Apr 12 18:22:27.983596 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Apr 12 18:22:27.983611 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Apr 12 18:22:27.983684 kernel: Zone ranges: Apr 12 18:22:27.983708 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Apr 12 18:22:27.983723 kernel: DMA32 empty Apr 12 18:22:27.983738 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Apr 12 18:22:27.983760 kernel: Movable zone start for each node Apr 12 18:22:27.983775 kernel: Early memory node ranges Apr 12 18:22:27.983790 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Apr 12 18:22:27.983805 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Apr 12 18:22:27.983820 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Apr 12 18:22:27.983835 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Apr 12 18:22:27.983849 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Apr 12 18:22:27.983864 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Apr 12 18:22:27.983879 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Apr 12 18:22:27.983894 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Apr 12 18:22:27.983909 kernel: psci: probing for conduit method from ACPI. Apr 12 18:22:27.983924 kernel: psci: PSCIv1.0 detected in firmware. Apr 12 18:22:27.983943 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:22:27.983958 kernel: psci: Trusted OS migration not required Apr 12 18:22:27.983980 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:22:27.983996 kernel: ACPI: SRAT not present Apr 12 18:22:27.984012 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:22:27.984032 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:22:27.984048 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:22:27.984064 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:22:27.984079 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:22:27.984095 kernel: CPU features: detected: Spectre-v2 Apr 12 18:22:27.984110 kernel: CPU features: detected: Spectre-v3a Apr 12 18:22:27.984126 kernel: CPU features: detected: Spectre-BHB Apr 12 18:22:27.984142 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:22:27.984157 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:22:27.984173 kernel: CPU features: detected: ARM erratum 1742098 Apr 12 18:22:27.984188 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Apr 12 18:22:27.984208 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Apr 12 18:22:27.984224 kernel: Policy zone: Normal Apr 12 18:22:27.984242 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:22:27.984259 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:22:27.984274 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:22:27.984290 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:22:27.984305 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:22:27.984321 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Apr 12 18:22:27.984337 kernel: Memory: 3824652K/4030464K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 205812K reserved, 0K cma-reserved) Apr 12 18:22:27.984353 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:22:27.984373 kernel: trace event string verifier disabled Apr 12 18:22:27.984389 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:22:27.984405 kernel: rcu: RCU event tracing is enabled. Apr 12 18:22:27.984422 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:22:27.984438 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:22:27.984454 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:22:27.984470 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:22:27.984485 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:22:27.984501 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:22:27.984516 kernel: GICv3: 96 SPIs implemented Apr 12 18:22:27.984532 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:22:27.984547 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:22:27.984567 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:22:27.984583 kernel: GICv3: 16 PPIs implemented Apr 12 18:22:27.984598 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Apr 12 18:22:27.984613 kernel: ACPI: SRAT not present Apr 12 18:22:27.984656 kernel: ITS [mem 0x10080000-0x1009ffff] Apr 12 18:22:27.984674 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:22:27.984690 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:22:27.984706 kernel: GICv3: using LPI property table @0x00000004000c0000 Apr 12 18:22:27.984721 kernel: ITS: Using hypervisor restricted LPI range [128] Apr 12 18:22:27.984736 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Apr 12 18:22:27.984751 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Apr 12 18:22:27.984773 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Apr 12 18:22:27.984789 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Apr 12 18:22:27.984804 kernel: Console: colour dummy device 80x25 Apr 12 18:22:27.984820 kernel: printk: console [tty1] enabled Apr 12 18:22:27.984836 kernel: ACPI: Core revision 20210730 Apr 12 18:22:27.992689 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Apr 12 18:22:27.992720 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:22:27.992737 kernel: LSM: Security Framework initializing Apr 12 18:22:27.992753 kernel: SELinux: Initializing. Apr 12 18:22:27.992769 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:22:27.992794 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:22:27.992810 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:22:27.992826 kernel: Platform MSI: ITS@0x10080000 domain created Apr 12 18:22:27.992842 kernel: PCI/MSI: ITS@0x10080000 domain created Apr 12 18:22:27.992857 kernel: Remapping and enabling EFI services. Apr 12 18:22:27.992873 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:22:27.992889 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:22:27.992904 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Apr 12 18:22:27.992920 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Apr 12 18:22:27.992940 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Apr 12 18:22:27.992956 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:22:27.992972 kernel: SMP: Total of 2 processors activated. Apr 12 18:22:27.992987 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:22:27.993002 kernel: CPU features: detected: 32-bit EL1 Support Apr 12 18:22:27.993018 kernel: CPU features: detected: CRC32 instructions Apr 12 18:22:27.993033 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:22:27.993049 kernel: alternatives: patching kernel code Apr 12 18:22:27.993065 kernel: devtmpfs: initialized Apr 12 18:22:27.993085 kernel: KASLR disabled due to lack of seed Apr 12 18:22:27.993101 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:22:27.993118 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:22:27.993144 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:22:27.993164 kernel: SMBIOS 3.0.0 present. Apr 12 18:22:27.993180 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Apr 12 18:22:27.993196 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:22:27.993213 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:22:27.993229 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:22:27.993245 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:22:27.993262 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:22:27.993279 kernel: audit: type=2000 audit(0.263:1): state=initialized audit_enabled=0 res=1 Apr 12 18:22:27.993299 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:22:27.993316 kernel: cpuidle: using governor menu Apr 12 18:22:27.993345 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:22:27.993368 kernel: ASID allocator initialised with 32768 entries Apr 12 18:22:27.993385 kernel: ACPI: bus type PCI registered Apr 12 18:22:27.993407 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:22:27.993424 kernel: Serial: AMBA PL011 UART driver Apr 12 18:22:27.993440 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:22:27.993456 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:22:27.993473 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:22:27.993489 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:22:27.993506 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:22:27.993522 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:22:27.993538 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:22:27.993559 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:22:27.993575 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:22:27.993592 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:22:27.993609 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:22:27.993649 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:22:27.993670 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:22:27.993687 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:22:27.993703 kernel: ACPI: Interpreter enabled Apr 12 18:22:27.993719 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:22:27.993740 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:22:27.993757 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Apr 12 18:22:27.994052 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:22:27.994255 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:22:27.994451 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:22:27.994686 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Apr 12 18:22:27.994892 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Apr 12 18:22:27.994925 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Apr 12 18:22:27.994943 kernel: acpiphp: Slot [1] registered Apr 12 18:22:27.994960 kernel: acpiphp: Slot [2] registered Apr 12 18:22:27.994977 kernel: acpiphp: Slot [3] registered Apr 12 18:22:27.994993 kernel: acpiphp: Slot [4] registered Apr 12 18:22:28.005776 kernel: acpiphp: Slot [5] registered Apr 12 18:22:28.005818 kernel: acpiphp: Slot [6] registered Apr 12 18:22:28.005835 kernel: acpiphp: Slot [7] registered Apr 12 18:22:28.005851 kernel: acpiphp: Slot [8] registered Apr 12 18:22:28.005877 kernel: acpiphp: Slot [9] registered Apr 12 18:22:28.005893 kernel: acpiphp: Slot [10] registered Apr 12 18:22:28.005909 kernel: acpiphp: Slot [11] registered Apr 12 18:22:28.005925 kernel: acpiphp: Slot [12] registered Apr 12 18:22:28.005942 kernel: acpiphp: Slot [13] registered Apr 12 18:22:28.005957 kernel: acpiphp: Slot [14] registered Apr 12 18:22:28.005973 kernel: acpiphp: Slot [15] registered Apr 12 18:22:28.005990 kernel: acpiphp: Slot [16] registered Apr 12 18:22:28.006006 kernel: acpiphp: Slot [17] registered Apr 12 18:22:28.006022 kernel: acpiphp: Slot [18] registered Apr 12 18:22:28.006042 kernel: acpiphp: Slot [19] registered Apr 12 18:22:28.006058 kernel: acpiphp: Slot [20] registered Apr 12 18:22:28.006074 kernel: acpiphp: Slot [21] registered Apr 12 18:22:28.006090 kernel: acpiphp: Slot [22] registered Apr 12 18:22:28.006106 kernel: acpiphp: Slot [23] registered Apr 12 18:22:28.006122 kernel: acpiphp: Slot [24] registered Apr 12 18:22:28.006138 kernel: acpiphp: Slot [25] registered Apr 12 18:22:28.006154 kernel: acpiphp: Slot [26] registered Apr 12 18:22:28.006170 kernel: acpiphp: Slot [27] registered Apr 12 18:22:28.006190 kernel: acpiphp: Slot [28] registered Apr 12 18:22:28.006207 kernel: acpiphp: Slot [29] registered Apr 12 18:22:28.006223 kernel: acpiphp: Slot [30] registered Apr 12 18:22:28.006239 kernel: acpiphp: Slot [31] registered Apr 12 18:22:28.006255 kernel: PCI host bridge to bus 0000:00 Apr 12 18:22:28.006501 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Apr 12 18:22:28.007814 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:22:28.008012 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Apr 12 18:22:28.008195 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Apr 12 18:22:28.008416 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Apr 12 18:22:28.010690 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Apr 12 18:22:28.010969 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Apr 12 18:22:28.011182 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Apr 12 18:22:28.011379 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Apr 12 18:22:28.011584 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:22:28.011903 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Apr 12 18:22:28.012118 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Apr 12 18:22:28.012321 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Apr 12 18:22:28.012513 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Apr 12 18:22:28.012762 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 18:22:28.012958 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Apr 12 18:22:28.013161 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Apr 12 18:22:28.013376 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Apr 12 18:22:28.013583 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Apr 12 18:22:28.013834 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Apr 12 18:22:28.014025 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Apr 12 18:22:28.014210 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:22:28.014390 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Apr 12 18:22:28.014423 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:22:28.014440 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:22:28.014458 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:22:28.014475 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:22:28.014492 kernel: iommu: Default domain type: Translated Apr 12 18:22:28.014508 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:22:28.014524 kernel: vgaarb: loaded Apr 12 18:22:28.014541 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:22:28.014557 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:22:28.014578 kernel: PTP clock support registered Apr 12 18:22:28.014595 kernel: Registered efivars operations Apr 12 18:22:28.014611 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:22:28.014652 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:22:28.014671 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:22:28.014688 kernel: pnp: PnP ACPI init Apr 12 18:22:28.014924 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Apr 12 18:22:28.014950 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:22:28.014967 kernel: NET: Registered PF_INET protocol family Apr 12 18:22:28.014992 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:22:28.015009 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:22:28.015025 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:22:28.015042 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:22:28.015059 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:22:28.015076 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:22:28.015093 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:22:28.015109 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:22:28.015126 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:22:28.015147 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:22:28.015164 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Apr 12 18:22:28.015180 kernel: kvm [1]: HYP mode not available Apr 12 18:22:28.015196 kernel: Initialise system trusted keyrings Apr 12 18:22:28.015213 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:22:28.015229 kernel: Key type asymmetric registered Apr 12 18:22:28.015246 kernel: Asymmetric key parser 'x509' registered Apr 12 18:22:28.015262 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:22:28.015278 kernel: io scheduler mq-deadline registered Apr 12 18:22:28.015299 kernel: io scheduler kyber registered Apr 12 18:22:28.015316 kernel: io scheduler bfq registered Apr 12 18:22:28.015544 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Apr 12 18:22:28.015572 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:22:28.015589 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:22:28.015605 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:22:28.021301 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Apr 12 18:22:28.021614 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Apr 12 18:22:28.021742 kernel: printk: console [ttyS0] disabled Apr 12 18:22:28.021761 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Apr 12 18:22:28.021779 kernel: printk: console [ttyS0] enabled Apr 12 18:22:28.021796 kernel: printk: bootconsole [uart0] disabled Apr 12 18:22:28.021813 kernel: thunder_xcv, ver 1.0 Apr 12 18:22:28.021830 kernel: thunder_bgx, ver 1.0 Apr 12 18:22:28.021846 kernel: nicpf, ver 1.0 Apr 12 18:22:28.021863 kernel: nicvf, ver 1.0 Apr 12 18:22:28.029225 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:22:28.029452 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:22:27 UTC (1712946147) Apr 12 18:22:28.029478 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:22:28.029495 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:22:28.029512 kernel: Segment Routing with IPv6 Apr 12 18:22:28.029529 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:22:28.029545 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:22:28.029561 kernel: Key type dns_resolver registered Apr 12 18:22:28.029578 kernel: registered taskstats version 1 Apr 12 18:22:28.029601 kernel: Loading compiled-in X.509 certificates Apr 12 18:22:28.029618 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:22:28.029656 kernel: Key type .fscrypt registered Apr 12 18:22:28.029673 kernel: Key type fscrypt-provisioning registered Apr 12 18:22:28.029690 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:22:28.029706 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:22:28.029722 kernel: ima: No architecture policies found Apr 12 18:22:28.029739 kernel: Freeing unused kernel memory: 36352K Apr 12 18:22:28.029755 kernel: Run /init as init process Apr 12 18:22:28.029776 kernel: with arguments: Apr 12 18:22:28.029793 kernel: /init Apr 12 18:22:28.029808 kernel: with environment: Apr 12 18:22:28.029824 kernel: HOME=/ Apr 12 18:22:28.029840 kernel: TERM=linux Apr 12 18:22:28.029856 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:22:28.029877 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:22:28.029899 systemd[1]: Detected virtualization amazon. Apr 12 18:22:28.029922 systemd[1]: Detected architecture arm64. Apr 12 18:22:28.029940 systemd[1]: Running in initrd. Apr 12 18:22:28.029957 systemd[1]: No hostname configured, using default hostname. Apr 12 18:22:28.029975 systemd[1]: Hostname set to . Apr 12 18:22:28.029993 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:22:28.030010 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:22:28.030028 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:22:28.030045 systemd[1]: Reached target cryptsetup.target. Apr 12 18:22:28.030067 systemd[1]: Reached target paths.target. Apr 12 18:22:28.030085 systemd[1]: Reached target slices.target. Apr 12 18:22:28.030102 systemd[1]: Reached target swap.target. Apr 12 18:22:28.030119 systemd[1]: Reached target timers.target. Apr 12 18:22:28.030137 systemd[1]: Listening on iscsid.socket. Apr 12 18:22:28.030155 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:22:28.030173 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:22:28.030190 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:22:28.030212 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:22:28.030230 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:22:28.030247 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:22:28.030265 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:22:28.030283 systemd[1]: Reached target sockets.target. Apr 12 18:22:28.030301 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:22:28.030318 systemd[1]: Finished network-cleanup.service. Apr 12 18:22:28.030336 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:22:28.030353 systemd[1]: Starting systemd-journald.service... Apr 12 18:22:28.030375 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:22:28.030393 systemd[1]: Starting systemd-resolved.service... Apr 12 18:22:28.030410 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:22:28.030427 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:22:28.030446 kernel: audit: type=1130 audit(1712946147.993:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.030463 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:22:28.030481 kernel: audit: type=1130 audit(1712946148.020:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.030499 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:22:28.030524 systemd-journald[268]: Journal started Apr 12 18:22:28.030614 systemd-journald[268]: Runtime Journal (/run/log/journal/ec2a6009a0c324ea5f7fec7bdd2b908e) is 8.0M, max 75.4M, 67.4M free. Apr 12 18:22:27.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.006701 systemd-modules-load[269]: Inserted module 'overlay' Apr 12 18:22:28.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.054659 kernel: audit: type=1130 audit(1712946148.043:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.054716 systemd[1]: Started systemd-journald.service. Apr 12 18:22:28.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.076937 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:22:28.081667 kernel: audit: type=1130 audit(1712946148.066:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.087660 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:22:28.090654 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:22:28.112619 systemd-resolved[270]: Positive Trust Anchors: Apr 12 18:22:28.112679 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:22:28.112739 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:22:28.119905 systemd-modules-load[269]: Inserted module 'br_netfilter' Apr 12 18:22:28.120656 kernel: Bridge firewalling registered Apr 12 18:22:28.153029 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:22:28.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.178671 kernel: audit: type=1130 audit(1712946148.160:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.187973 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:22:28.197197 kernel: SCSI subsystem initialized Apr 12 18:22:28.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.207669 kernel: audit: type=1130 audit(1712946148.196:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.213161 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:22:28.229882 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:22:28.229954 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:22:28.233305 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:22:28.241885 systemd-modules-load[269]: Inserted module 'dm_multipath' Apr 12 18:22:28.246689 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:22:28.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.259282 dracut-cmdline[285]: dracut-dracut-053 Apr 12 18:22:28.267125 kernel: audit: type=1130 audit(1712946148.248:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.259873 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:22:28.279204 dracut-cmdline[285]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:22:28.309273 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:22:28.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.321667 kernel: audit: type=1130 audit(1712946148.310:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.437665 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:22:28.459669 kernel: iscsi: registered transport (tcp) Apr 12 18:22:28.486732 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:22:28.486813 kernel: QLogic iSCSI HBA Driver Apr 12 18:22:28.668550 systemd-resolved[270]: Defaulting to hostname 'linux'. Apr 12 18:22:28.670469 kernel: random: crng init done Apr 12 18:22:28.672003 systemd[1]: Started systemd-resolved.service. Apr 12 18:22:28.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.673922 systemd[1]: Reached target nss-lookup.target. Apr 12 18:22:28.687156 kernel: audit: type=1130 audit(1712946148.672:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.702003 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:22:28.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:28.705690 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:22:28.772672 kernel: raid6: neonx8 gen() 6404 MB/s Apr 12 18:22:28.790668 kernel: raid6: neonx8 xor() 4582 MB/s Apr 12 18:22:28.808668 kernel: raid6: neonx4 gen() 6533 MB/s Apr 12 18:22:28.826668 kernel: raid6: neonx4 xor() 4744 MB/s Apr 12 18:22:28.844671 kernel: raid6: neonx2 gen() 5752 MB/s Apr 12 18:22:28.862670 kernel: raid6: neonx2 xor() 4380 MB/s Apr 12 18:22:28.880675 kernel: raid6: neonx1 gen() 4479 MB/s Apr 12 18:22:28.898663 kernel: raid6: neonx1 xor() 3579 MB/s Apr 12 18:22:28.916671 kernel: raid6: int64x8 gen() 3433 MB/s Apr 12 18:22:28.934674 kernel: raid6: int64x8 xor() 2028 MB/s Apr 12 18:22:28.952680 kernel: raid6: int64x4 gen() 3834 MB/s Apr 12 18:22:28.970673 kernel: raid6: int64x4 xor() 2149 MB/s Apr 12 18:22:28.988678 kernel: raid6: int64x2 gen() 3603 MB/s Apr 12 18:22:29.006666 kernel: raid6: int64x2 xor() 1920 MB/s Apr 12 18:22:29.024678 kernel: raid6: int64x1 gen() 2749 MB/s Apr 12 18:22:29.044684 kernel: raid6: int64x1 xor() 1431 MB/s Apr 12 18:22:29.044749 kernel: raid6: using algorithm neonx4 gen() 6533 MB/s Apr 12 18:22:29.044774 kernel: raid6: .... xor() 4744 MB/s, rmw enabled Apr 12 18:22:29.046737 kernel: raid6: using neon recovery algorithm Apr 12 18:22:29.066681 kernel: xor: measuring software checksum speed Apr 12 18:22:29.068666 kernel: 8regs : 9401 MB/sec Apr 12 18:22:29.071670 kernel: 32regs : 11164 MB/sec Apr 12 18:22:29.075605 kernel: arm64_neon : 9645 MB/sec Apr 12 18:22:29.075699 kernel: xor: using function: 32regs (11164 MB/sec) Apr 12 18:22:29.168691 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:22:29.188079 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:22:29.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:29.189000 audit: BPF prog-id=7 op=LOAD Apr 12 18:22:29.190000 audit: BPF prog-id=8 op=LOAD Apr 12 18:22:29.193143 systemd[1]: Starting systemd-udevd.service... Apr 12 18:22:29.224932 systemd-udevd[468]: Using default interface naming scheme 'v252'. Apr 12 18:22:29.235807 systemd[1]: Started systemd-udevd.service. Apr 12 18:22:29.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:29.243973 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:22:29.274547 dracut-pre-trigger[480]: rd.md=0: removing MD RAID activation Apr 12 18:22:29.342543 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:22:29.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:29.347673 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:22:29.456830 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:22:29.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:29.568369 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:22:29.568434 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Apr 12 18:22:29.584177 kernel: ena 0000:00:05.0: ENA device version: 0.10 Apr 12 18:22:29.584481 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Apr 12 18:22:29.594814 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Apr 12 18:22:29.594885 kernel: nvme nvme0: pci function 0000:00:04.0 Apr 12 18:22:29.602673 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:f1:91:9c:3e:2d Apr 12 18:22:29.606679 kernel: nvme nvme0: 2/0/0 default/read/poll queues Apr 12 18:22:29.613847 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:22:29.613906 kernel: GPT:9289727 != 16777215 Apr 12 18:22:29.613930 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:22:29.616000 kernel: GPT:9289727 != 16777215 Apr 12 18:22:29.617262 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:22:29.620706 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:22:29.625289 (udev-worker)[522]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:22:29.711685 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (527) Apr 12 18:22:29.734372 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:22:29.798224 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:22:29.819518 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:22:29.833202 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:22:29.860086 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:22:29.882857 systemd[1]: Starting disk-uuid.service... Apr 12 18:22:29.897160 disk-uuid[628]: Primary Header is updated. Apr 12 18:22:29.897160 disk-uuid[628]: Secondary Entries is updated. Apr 12 18:22:29.897160 disk-uuid[628]: Secondary Header is updated. Apr 12 18:22:29.904668 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:22:29.914674 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:22:29.924671 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:22:30.922682 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:22:30.924194 disk-uuid[629]: The operation has completed successfully. Apr 12 18:22:31.077188 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:22:31.079529 systemd[1]: Finished disk-uuid.service. Apr 12 18:22:31.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.112547 systemd[1]: Starting verity-setup.service... Apr 12 18:22:31.153668 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:22:31.228046 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:22:31.233107 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:22:31.236839 systemd[1]: Finished verity-setup.service. Apr 12 18:22:31.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.323669 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:22:31.324520 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:22:31.328306 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:22:31.332338 systemd[1]: Starting ignition-setup.service... Apr 12 18:22:31.345262 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:22:31.361575 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:22:31.361663 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:22:31.363874 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:22:31.373738 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:22:31.393002 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:22:31.428923 systemd[1]: Finished ignition-setup.service. Apr 12 18:22:31.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.433442 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:22:31.494197 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:22:31.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.497000 audit: BPF prog-id=9 op=LOAD Apr 12 18:22:31.499816 systemd[1]: Starting systemd-networkd.service... Apr 12 18:22:31.543581 systemd-networkd[1141]: lo: Link UP Apr 12 18:22:31.543613 systemd-networkd[1141]: lo: Gained carrier Apr 12 18:22:31.547023 systemd-networkd[1141]: Enumeration completed Apr 12 18:22:31.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.547495 systemd-networkd[1141]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:22:31.547813 systemd[1]: Started systemd-networkd.service. Apr 12 18:22:31.550183 systemd[1]: Reached target network.target. Apr 12 18:22:31.556793 systemd-networkd[1141]: eth0: Link UP Apr 12 18:22:31.556801 systemd-networkd[1141]: eth0: Gained carrier Apr 12 18:22:31.575434 systemd[1]: Starting iscsiuio.service... Apr 12 18:22:31.587845 systemd-networkd[1141]: eth0: DHCPv4 address 172.31.29.129/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:22:31.591167 systemd[1]: Started iscsiuio.service. Apr 12 18:22:31.595236 systemd[1]: Starting iscsid.service... Apr 12 18:22:31.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.604538 iscsid[1146]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:22:31.604538 iscsid[1146]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:22:31.604538 iscsid[1146]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:22:31.604538 iscsid[1146]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:22:31.604538 iscsid[1146]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:22:31.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.628118 iscsid[1146]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:22:31.620792 systemd[1]: Started iscsid.service. Apr 12 18:22:31.623544 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:22:31.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:31.651489 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:22:31.653907 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:22:31.655711 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:22:31.657507 systemd[1]: Reached target remote-fs.target. Apr 12 18:22:31.662718 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:22:31.684580 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:22:31.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.313806 ignition[1090]: Ignition 2.14.0 Apr 12 18:22:32.315530 ignition[1090]: Stage: fetch-offline Apr 12 18:22:32.317373 ignition[1090]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:32.319863 ignition[1090]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:32.336354 ignition[1090]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:32.337437 ignition[1090]: Ignition finished successfully Apr 12 18:22:32.342260 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:22:32.355247 kernel: kauditd_printk_skb: 18 callbacks suppressed Apr 12 18:22:32.355289 kernel: audit: type=1130 audit(1712946152.342:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.347174 systemd[1]: Starting ignition-fetch.service... Apr 12 18:22:32.365086 ignition[1165]: Ignition 2.14.0 Apr 12 18:22:32.365116 ignition[1165]: Stage: fetch Apr 12 18:22:32.365422 ignition[1165]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:32.365476 ignition[1165]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:32.380949 ignition[1165]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:32.383357 ignition[1165]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:32.392269 ignition[1165]: INFO : PUT result: OK Apr 12 18:22:32.395524 ignition[1165]: DEBUG : parsed url from cmdline: "" Apr 12 18:22:32.395524 ignition[1165]: INFO : no config URL provided Apr 12 18:22:32.395524 ignition[1165]: INFO : reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:22:32.401610 ignition[1165]: INFO : no config at "/usr/lib/ignition/user.ign" Apr 12 18:22:32.401610 ignition[1165]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:32.401610 ignition[1165]: INFO : PUT result: OK Apr 12 18:22:32.407709 ignition[1165]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Apr 12 18:22:32.410528 ignition[1165]: INFO : GET result: OK Apr 12 18:22:32.412015 ignition[1165]: DEBUG : parsing config with SHA512: 90861e1f9ea8f66c8a6e9f933337590ad831969e7fff796be2305d344fd9d5d04a81a61b71fe9d9cf0720334c60891e75a3ce6e856d75447267535a100bf3f0d Apr 12 18:22:32.447533 unknown[1165]: fetched base config from "system" Apr 12 18:22:32.447562 unknown[1165]: fetched base config from "system" Apr 12 18:22:32.447578 unknown[1165]: fetched user config from "aws" Apr 12 18:22:32.453235 ignition[1165]: fetch: fetch complete Apr 12 18:22:32.453260 ignition[1165]: fetch: fetch passed Apr 12 18:22:32.453374 ignition[1165]: Ignition finished successfully Apr 12 18:22:32.459871 systemd[1]: Finished ignition-fetch.service. Apr 12 18:22:32.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.464395 systemd[1]: Starting ignition-kargs.service... Apr 12 18:22:32.477515 kernel: audit: type=1130 audit(1712946152.458:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.490125 ignition[1171]: Ignition 2.14.0 Apr 12 18:22:32.490152 ignition[1171]: Stage: kargs Apr 12 18:22:32.490447 ignition[1171]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:32.490498 ignition[1171]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:32.502819 ignition[1171]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:32.505111 ignition[1171]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:32.508263 ignition[1171]: INFO : PUT result: OK Apr 12 18:22:32.524919 ignition[1171]: kargs: kargs passed Apr 12 18:22:32.525030 ignition[1171]: Ignition finished successfully Apr 12 18:22:32.532700 systemd[1]: Finished ignition-kargs.service. Apr 12 18:22:32.544804 kernel: audit: type=1130 audit(1712946152.532:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.536041 systemd[1]: Starting ignition-disks.service... Apr 12 18:22:32.554688 ignition[1177]: Ignition 2.14.0 Apr 12 18:22:32.556429 ignition[1177]: Stage: disks Apr 12 18:22:32.558175 ignition[1177]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:32.560669 ignition[1177]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:32.576147 ignition[1177]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:32.578781 ignition[1177]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:32.582024 ignition[1177]: INFO : PUT result: OK Apr 12 18:22:32.600889 ignition[1177]: disks: disks passed Apr 12 18:22:32.600993 ignition[1177]: Ignition finished successfully Apr 12 18:22:32.605047 systemd[1]: Finished ignition-disks.service. Apr 12 18:22:32.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.616977 kernel: audit: type=1130 audit(1712946152.603:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.607847 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:22:32.617019 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:22:32.620205 systemd[1]: Reached target local-fs.target. Apr 12 18:22:32.621852 systemd[1]: Reached target sysinit.target. Apr 12 18:22:32.624834 systemd[1]: Reached target basic.target. Apr 12 18:22:32.627402 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:22:32.679079 systemd-fsck[1185]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:22:32.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.687037 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:22:32.699172 kernel: audit: type=1130 audit(1712946152.687:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:32.690172 systemd[1]: Mounting sysroot.mount... Apr 12 18:22:32.718672 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:22:32.720079 systemd[1]: Mounted sysroot.mount. Apr 12 18:22:32.723198 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:22:32.740608 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:22:32.744605 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:22:32.745921 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:22:32.745983 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:22:32.760336 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:22:32.786804 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:22:32.791935 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:22:32.809669 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1202) Apr 12 18:22:32.816054 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:22:32.816117 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:22:32.816141 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:22:32.817064 initrd-setup-root[1207]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:22:32.826872 initrd-setup-root[1231]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:22:32.834395 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:22:32.839204 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:22:32.845145 initrd-setup-root[1241]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:22:32.854072 initrd-setup-root[1249]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:22:33.151205 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:22:33.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:33.155889 systemd[1]: Starting ignition-mount.service... Apr 12 18:22:33.166143 kernel: audit: type=1130 audit(1712946153.153:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:33.166944 systemd[1]: Starting sysroot-boot.service... Apr 12 18:22:33.182028 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:22:33.184281 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:22:33.214339 systemd[1]: Finished sysroot-boot.service. Apr 12 18:22:33.223688 ignition[1270]: INFO : Ignition 2.14.0 Apr 12 18:22:33.225508 ignition[1270]: INFO : Stage: mount Apr 12 18:22:33.225508 ignition[1270]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:33.225508 ignition[1270]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:33.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:33.245531 kernel: audit: type=1130 audit(1712946153.228:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:33.248933 ignition[1270]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:33.251538 ignition[1270]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:33.254659 ignition[1270]: INFO : PUT result: OK Apr 12 18:22:33.260086 ignition[1270]: INFO : mount: mount passed Apr 12 18:22:33.261848 ignition[1270]: INFO : Ignition finished successfully Apr 12 18:22:33.265106 systemd[1]: Finished ignition-mount.service. Apr 12 18:22:33.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:33.278561 kernel: audit: type=1130 audit(1712946153.267:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:33.277064 systemd[1]: Starting ignition-files.service... Apr 12 18:22:33.286316 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:22:33.305670 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1277) Apr 12 18:22:33.312322 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:22:33.312385 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:22:33.312410 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:22:33.321654 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:22:33.326407 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:22:33.346363 ignition[1296]: INFO : Ignition 2.14.0 Apr 12 18:22:33.346363 ignition[1296]: INFO : Stage: files Apr 12 18:22:33.349822 ignition[1296]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:33.349822 ignition[1296]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:33.364238 ignition[1296]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:33.367032 ignition[1296]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:33.370308 ignition[1296]: INFO : PUT result: OK Apr 12 18:22:33.375442 ignition[1296]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:22:33.379592 ignition[1296]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:22:33.382411 ignition[1296]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:22:33.420015 ignition[1296]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:22:33.422829 ignition[1296]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:22:33.426734 unknown[1296]: wrote ssh authorized keys file for user: core Apr 12 18:22:33.429042 ignition[1296]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:22:33.432714 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:22:33.436650 ignition[1296]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:22:33.523932 systemd-networkd[1141]: eth0: Gained IPv6LL Apr 12 18:22:33.808185 ignition[1296]: INFO : GET result: OK Apr 12 18:22:34.384967 ignition[1296]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:22:34.389683 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:22:34.393590 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:22:34.397552 ignition[1296]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:22:34.646196 ignition[1296]: INFO : GET result: OK Apr 12 18:22:34.935381 ignition[1296]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:22:34.940063 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:22:34.940063 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:22:34.940063 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:34.958090 ignition[1296]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2244433424" Apr 12 18:22:34.964891 ignition[1296]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2244433424": device or resource busy Apr 12 18:22:34.964891 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2244433424", trying btrfs: device or resource busy Apr 12 18:22:34.964891 ignition[1296]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2244433424" Apr 12 18:22:34.975662 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1299) Apr 12 18:22:34.982224 ignition[1296]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2244433424" Apr 12 18:22:34.997998 ignition[1296]: INFO : op(3): [started] unmounting "/mnt/oem2244433424" Apr 12 18:22:35.002379 systemd[1]: mnt-oem2244433424.mount: Deactivated successfully. Apr 12 18:22:35.005441 ignition[1296]: INFO : op(3): [finished] unmounting "/mnt/oem2244433424" Apr 12 18:22:35.007769 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:22:35.011433 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:22:35.014901 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:22:35.125839 ignition[1296]: INFO : GET result: OK Apr 12 18:22:35.746390 ignition[1296]: DEBUG : file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 18:22:35.751743 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:22:35.751743 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:22:35.751743 ignition[1296]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:22:35.813003 ignition[1296]: INFO : GET result: OK Apr 12 18:22:37.232160 ignition[1296]: DEBUG : file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 18:22:37.237255 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:22:37.237255 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:22:37.237255 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:22:37.237255 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:22:37.250992 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:22:37.261556 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:22:37.265208 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:22:37.265208 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:22:37.272816 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:37.284981 ignition[1296]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3605701345" Apr 12 18:22:37.287947 ignition[1296]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3605701345": device or resource busy Apr 12 18:22:37.287947 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3605701345", trying btrfs: device or resource busy Apr 12 18:22:37.287947 ignition[1296]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3605701345" Apr 12 18:22:37.298145 ignition[1296]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3605701345" Apr 12 18:22:37.298145 ignition[1296]: INFO : op(6): [started] unmounting "/mnt/oem3605701345" Apr 12 18:22:37.298145 ignition[1296]: INFO : op(6): [finished] unmounting "/mnt/oem3605701345" Apr 12 18:22:37.298145 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:22:37.298145 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:22:37.298145 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:37.329612 ignition[1296]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3381243058" Apr 12 18:22:37.332464 ignition[1296]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3381243058": device or resource busy Apr 12 18:22:37.332464 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3381243058", trying btrfs: device or resource busy Apr 12 18:22:37.332464 ignition[1296]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3381243058" Apr 12 18:22:37.352066 ignition[1296]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3381243058" Apr 12 18:22:37.352066 ignition[1296]: INFO : op(9): [started] unmounting "/mnt/oem3381243058" Apr 12 18:22:37.350599 systemd[1]: mnt-oem3381243058.mount: Deactivated successfully. Apr 12 18:22:37.360982 ignition[1296]: INFO : op(9): [finished] unmounting "/mnt/oem3381243058" Apr 12 18:22:37.368987 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:22:37.372947 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:22:37.377461 ignition[1296]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:22:37.389599 ignition[1296]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1680906004" Apr 12 18:22:37.392501 ignition[1296]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1680906004": device or resource busy Apr 12 18:22:37.392501 ignition[1296]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1680906004", trying btrfs: device or resource busy Apr 12 18:22:37.392501 ignition[1296]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1680906004" Apr 12 18:22:37.392501 ignition[1296]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1680906004" Apr 12 18:22:37.419214 ignition[1296]: INFO : op(c): [started] unmounting "/mnt/oem1680906004" Apr 12 18:22:37.421642 ignition[1296]: INFO : op(c): [finished] unmounting "/mnt/oem1680906004" Apr 12 18:22:37.421642 ignition[1296]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:22:37.421642 ignition[1296]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:22:37.421642 ignition[1296]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:22:37.421642 ignition[1296]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(11): [started] processing unit "nvidia.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(11): [finished] processing unit "nvidia.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:22:37.435654 ignition[1296]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(18): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:22:37.457896 ignition[1296]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:22:37.513716 ignition[1296]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:22:37.513716 ignition[1296]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:22:37.513716 ignition[1296]: INFO : files: files passed Apr 12 18:22:37.531360 ignition[1296]: INFO : Ignition finished successfully Apr 12 18:22:37.533233 systemd[1]: Finished ignition-files.service. Apr 12 18:22:37.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.544670 kernel: audit: type=1130 audit(1712946157.535:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.555415 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:22:37.557448 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:22:37.559040 systemd[1]: Starting ignition-quench.service... Apr 12 18:22:37.573456 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:22:37.575492 systemd[1]: Finished ignition-quench.service. Apr 12 18:22:37.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.593581 kernel: audit: type=1130 audit(1712946157.577:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.593667 kernel: audit: type=1131 audit(1712946157.577:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.595652 initrd-setup-root-after-ignition[1321]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:22:37.600042 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:22:37.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.603929 systemd[1]: Reached target ignition-complete.target. Apr 12 18:22:37.614844 kernel: audit: type=1130 audit(1712946157.602:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.616316 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:22:37.644516 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:22:37.647042 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:22:37.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.651079 systemd[1]: Reached target initrd-fs.target. Apr 12 18:22:37.672218 kernel: audit: type=1130 audit(1712946157.649:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.672259 kernel: audit: type=1131 audit(1712946157.649:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.668019 systemd[1]: Reached target initrd.target. Apr 12 18:22:37.669661 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:22:37.676879 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:22:37.702260 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:22:37.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.706966 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:22:37.716431 kernel: audit: type=1130 audit(1712946157.704:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.729182 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:22:37.732596 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:22:37.736013 systemd[1]: Stopped target timers.target. Apr 12 18:22:37.739081 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:22:37.741182 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:22:37.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.744654 systemd[1]: Stopped target initrd.target. Apr 12 18:22:37.753948 kernel: audit: type=1131 audit(1712946157.743:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.755951 systemd[1]: Stopped target basic.target. Apr 12 18:22:37.759619 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:22:37.763805 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:22:37.767928 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:22:37.772106 systemd[1]: Stopped target remote-fs.target. Apr 12 18:22:37.775902 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:22:37.779915 systemd[1]: Stopped target sysinit.target. Apr 12 18:22:37.783550 systemd[1]: Stopped target local-fs.target. Apr 12 18:22:37.787253 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:22:37.791083 systemd[1]: Stopped target swap.target. Apr 12 18:22:37.794433 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:22:37.796883 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:22:37.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.800649 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:22:37.811717 kernel: audit: type=1131 audit(1712946157.799:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.810538 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:22:37.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.825184 kernel: audit: type=1131 audit(1712946157.812:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.811308 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:22:37.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.814335 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:22:37.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.814796 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:22:37.825771 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:22:37.826026 systemd[1]: Stopped ignition-files.service. Apr 12 18:22:37.830861 systemd[1]: Stopping ignition-mount.service... Apr 12 18:22:37.837840 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:22:37.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.881413 ignition[1334]: INFO : Ignition 2.14.0 Apr 12 18:22:37.881413 ignition[1334]: INFO : Stage: umount Apr 12 18:22:37.881413 ignition[1334]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:22:37.881413 ignition[1334]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:22:37.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.838284 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:22:37.906428 ignition[1334]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:22:37.906428 ignition[1334]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:22:37.906428 ignition[1334]: INFO : PUT result: OK Apr 12 18:22:37.844189 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:22:37.924317 ignition[1334]: INFO : umount: umount passed Apr 12 18:22:37.924317 ignition[1334]: INFO : Ignition finished successfully Apr 12 18:22:37.859870 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:22:37.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.863964 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:22:37.870094 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:22:37.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.870485 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:22:37.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.904056 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:22:37.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.904324 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:22:37.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:37.931102 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:22:37.931367 systemd[1]: Stopped ignition-mount.service. Apr 12 18:22:37.934458 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:22:37.934832 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:22:37.938714 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:22:37.938843 systemd[1]: Stopped ignition-disks.service. Apr 12 18:22:37.941259 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:22:37.942048 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:22:37.945245 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:22:37.946049 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:22:37.948445 systemd[1]: Stopped target network.target. Apr 12 18:22:37.951541 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:22:37.951692 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:22:37.954032 systemd[1]: Stopped target paths.target. Apr 12 18:22:37.975152 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:22:37.975764 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:22:37.980411 systemd[1]: Stopped target slices.target. Apr 12 18:22:37.984072 systemd[1]: Stopped target sockets.target. Apr 12 18:22:37.987385 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:22:37.994648 systemd[1]: Closed iscsid.socket. Apr 12 18:22:38.000126 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:22:38.000224 systemd[1]: Closed iscsiuio.socket. Apr 12 18:22:38.003570 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:22:38.007192 systemd[1]: Stopped ignition-setup.service. Apr 12 18:22:38.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.010508 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:22:38.010659 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:22:38.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.016411 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:22:38.020065 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:22:38.023735 systemd-networkd[1141]: eth0: DHCPv6 lease lost Apr 12 18:22:38.027999 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:22:38.030338 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:22:38.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.036309 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:22:38.038394 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:22:38.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.040000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:22:38.040000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:22:38.042509 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:22:38.042613 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:22:38.048993 systemd[1]: Stopping network-cleanup.service... Apr 12 18:22:38.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.054791 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:22:38.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.054943 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:22:38.058581 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:22:38.058713 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:22:38.060833 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:22:38.060955 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:22:38.067072 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:22:38.083088 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:22:38.085236 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:22:38.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.089258 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:22:38.089540 systemd[1]: Stopped network-cleanup.service. Apr 12 18:22:38.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.095549 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:22:38.095803 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:22:38.101616 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:22:38.101776 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:22:38.105448 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:22:38.109249 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:22:38.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.112527 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:22:38.112716 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:22:38.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.118256 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:22:38.118370 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:22:38.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.125455 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:22:38.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:38.142791 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:22:38.142955 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:22:38.148282 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:22:38.148558 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:22:38.150862 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:22:38.155516 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:22:38.177731 systemd[1]: Switching root. Apr 12 18:22:38.212755 iscsid[1146]: iscsid shutting down. Apr 12 18:22:38.214828 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Apr 12 18:22:38.214886 systemd-journald[268]: Journal stopped Apr 12 18:22:43.915501 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:22:43.915843 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:22:43.915968 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:22:43.916002 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:22:43.916040 kernel: SELinux: policy capability open_perms=1 Apr 12 18:22:43.916073 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:22:43.916106 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:22:43.916147 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:22:43.916178 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:22:43.916211 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:22:43.916239 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:22:43.916277 systemd[1]: Successfully loaded SELinux policy in 100.801ms. Apr 12 18:22:43.916335 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.337ms. Apr 12 18:22:43.916372 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:22:43.916406 systemd[1]: Detected virtualization amazon. Apr 12 18:22:43.916436 systemd[1]: Detected architecture arm64. Apr 12 18:22:43.916467 systemd[1]: Detected first boot. Apr 12 18:22:43.916498 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:22:43.916530 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:22:43.916562 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:22:43.916598 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:43.916678 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:43.916718 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:43.916760 kernel: kauditd_printk_skb: 46 callbacks suppressed Apr 12 18:22:43.924221 kernel: audit: type=1334 audit(1712946163.508:86): prog-id=12 op=LOAD Apr 12 18:22:43.924264 kernel: audit: type=1334 audit(1712946163.508:87): prog-id=3 op=UNLOAD Apr 12 18:22:43.924294 kernel: audit: type=1334 audit(1712946163.510:88): prog-id=13 op=LOAD Apr 12 18:22:43.924325 kernel: audit: type=1334 audit(1712946163.513:89): prog-id=14 op=LOAD Apr 12 18:22:43.924599 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:22:43.925979 kernel: audit: type=1334 audit(1712946163.513:90): prog-id=4 op=UNLOAD Apr 12 18:22:43.926031 systemd[1]: Stopped iscsiuio.service. Apr 12 18:22:43.926064 kernel: audit: type=1334 audit(1712946163.513:91): prog-id=5 op=UNLOAD Apr 12 18:22:43.926094 kernel: audit: type=1131 audit(1712946163.517:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.926124 kernel: audit: type=1334 audit(1712946163.537:93): prog-id=12 op=UNLOAD Apr 12 18:22:43.926156 kernel: audit: type=1131 audit(1712946163.541:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.926187 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:22:43.926223 systemd[1]: Stopped iscsid.service. Apr 12 18:22:43.926256 kernel: audit: type=1131 audit(1712946163.554:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.926286 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:22:43.926316 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:22:43.926346 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:22:43.926379 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:22:43.926411 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:22:43.926445 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:22:43.926475 systemd[1]: Created slice system-getty.slice. Apr 12 18:22:43.926508 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:22:43.926539 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:22:43.926569 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:22:43.926599 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:22:43.926646 systemd[1]: Created slice user.slice. Apr 12 18:22:43.926680 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:22:43.926712 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:22:43.926747 systemd[1]: Set up automount boot.automount. Apr 12 18:22:43.926780 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:22:43.926812 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:22:43.926841 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:22:43.926872 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:22:43.926902 systemd[1]: Reached target integritysetup.target. Apr 12 18:22:43.926934 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:22:43.926966 systemd[1]: Reached target remote-fs.target. Apr 12 18:22:43.926997 systemd[1]: Reached target slices.target. Apr 12 18:22:43.927029 systemd[1]: Reached target swap.target. Apr 12 18:22:43.927062 systemd[1]: Reached target torcx.target. Apr 12 18:22:43.927094 systemd[1]: Reached target veritysetup.target. Apr 12 18:22:43.927125 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:22:43.927157 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:22:43.927189 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:22:43.927221 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:22:43.927250 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:22:43.927280 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:22:43.927309 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:22:43.927344 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:22:43.927373 systemd[1]: Mounting media.mount... Apr 12 18:22:43.927403 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:22:43.927436 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:22:43.928588 systemd[1]: Mounting tmp.mount... Apr 12 18:22:43.928635 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:22:43.929908 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:22:43.929942 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:22:43.929973 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:22:43.930010 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:22:43.930040 systemd[1]: Starting modprobe@drm.service... Apr 12 18:22:43.930070 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:22:43.930099 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:22:43.930129 systemd[1]: Starting modprobe@loop.service... Apr 12 18:22:43.930161 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:22:43.930193 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:22:43.930223 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:22:43.930253 kernel: fuse: init (API version 7.34) Apr 12 18:22:43.930287 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:22:43.930318 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:22:43.930349 kernel: loop: module loaded Apr 12 18:22:43.930377 systemd[1]: Stopped systemd-journald.service. Apr 12 18:22:43.930407 systemd[1]: Starting systemd-journald.service... Apr 12 18:22:43.930436 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:22:43.930465 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:22:43.930495 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:22:43.930535 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:22:43.930570 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:22:43.930600 systemd[1]: Stopped verity-setup.service. Apr 12 18:22:43.930754 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:22:43.930790 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:22:43.930820 systemd[1]: Mounted media.mount. Apr 12 18:22:43.930852 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:22:43.930882 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:22:43.930911 systemd[1]: Mounted tmp.mount. Apr 12 18:22:43.930945 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:22:43.930975 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:22:43.931009 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:22:43.931042 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:22:43.931074 systemd-journald[1445]: Journal started Apr 12 18:22:43.931170 systemd-journald[1445]: Runtime Journal (/run/log/journal/ec2a6009a0c324ea5f7fec7bdd2b908e) is 8.0M, max 75.4M, 67.4M free. Apr 12 18:22:39.002000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:22:39.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:22:39.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:22:39.222000 audit: BPF prog-id=10 op=LOAD Apr 12 18:22:39.222000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:22:39.222000 audit: BPF prog-id=11 op=LOAD Apr 12 18:22:39.222000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:22:43.935738 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:22:39.372000 audit[1367]: AVC avc: denied { associate } for pid=1367 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:22:39.372000 audit[1367]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1350 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:39.372000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:22:39.376000 audit[1367]: AVC avc: denied { associate } for pid=1367 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:22:39.376000 audit[1367]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1350 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:39.376000 audit: CWD cwd="/" Apr 12 18:22:39.376000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:39.376000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:22:39.376000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:22:43.508000 audit: BPF prog-id=12 op=LOAD Apr 12 18:22:43.508000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:22:43.510000 audit: BPF prog-id=13 op=LOAD Apr 12 18:22:43.513000 audit: BPF prog-id=14 op=LOAD Apr 12 18:22:43.513000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:22:43.513000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:22:43.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.537000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:22:43.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.825000 audit: BPF prog-id=15 op=LOAD Apr 12 18:22:43.825000 audit: BPF prog-id=16 op=LOAD Apr 12 18:22:43.826000 audit: BPF prog-id=17 op=LOAD Apr 12 18:22:43.826000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:22:43.826000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:22:43.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.904000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:22:43.904000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc83ecb40 a2=4000 a3=1 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:43.904000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:22:43.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.942759 systemd[1]: Started systemd-journald.service. Apr 12 18:22:43.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.506404 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:22:43.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:39.354864 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:43.518488 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:22:39.355571 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:22:43.940431 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:22:39.355644 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:22:43.940777 systemd[1]: Finished modprobe@drm.service. Apr 12 18:22:39.355722 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:22:43.942998 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:22:39.355750 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:22:43.943290 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:22:39.355818 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:22:43.945715 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:22:39.355850 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:22:39.356274 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:22:39.356355 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:22:39.356391 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:22:39.358186 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:22:39.358290 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:22:39.358341 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:22:39.358384 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:22:39.358437 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:22:39.358475 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:22:42.647845 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:42.648355 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:42.648587 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:42.649057 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:22:42.649161 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:22:42.649294 /usr/lib/systemd/system-generators/torcx-generator[1367]: time="2024-04-12T18:22:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:22:43.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.951899 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:22:43.956314 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:22:43.956606 systemd[1]: Finished modprobe@loop.service. Apr 12 18:22:43.959009 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:22:43.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.961794 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:22:43.964280 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:22:43.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:43.978719 systemd[1]: Reached target network-pre.target. Apr 12 18:22:43.983342 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:22:43.996419 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:22:44.001881 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:22:44.005983 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:22:44.009761 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:22:44.011787 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:22:44.013998 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:22:44.015809 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:22:44.018077 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:22:44.024552 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:22:44.027744 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:22:44.044761 systemd-journald[1445]: Time spent on flushing to /var/log/journal/ec2a6009a0c324ea5f7fec7bdd2b908e is 81.002ms for 1140 entries. Apr 12 18:22:44.044761 systemd-journald[1445]: System Journal (/var/log/journal/ec2a6009a0c324ea5f7fec7bdd2b908e) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:22:44.140001 systemd-journald[1445]: Received client request to flush runtime journal. Apr 12 18:22:44.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.059165 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:22:44.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.061245 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:22:44.087455 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:22:44.109322 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:22:44.113467 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:22:44.141546 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:22:44.175105 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:22:44.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.179169 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:22:44.194725 udevadm[1485]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:22:44.233864 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:22:44.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:44.954818 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:22:44.956000 audit: BPF prog-id=18 op=LOAD Apr 12 18:22:44.956000 audit: BPF prog-id=19 op=LOAD Apr 12 18:22:44.956000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:22:44.956000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:22:44.959046 systemd[1]: Starting systemd-udevd.service... Apr 12 18:22:44.995745 systemd-udevd[1486]: Using default interface naming scheme 'v252'. Apr 12 18:22:45.053456 systemd[1]: Started systemd-udevd.service. Apr 12 18:22:45.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.055000 audit: BPF prog-id=20 op=LOAD Apr 12 18:22:45.058300 systemd[1]: Starting systemd-networkd.service... Apr 12 18:22:45.063000 audit: BPF prog-id=21 op=LOAD Apr 12 18:22:45.064000 audit: BPF prog-id=22 op=LOAD Apr 12 18:22:45.064000 audit: BPF prog-id=23 op=LOAD Apr 12 18:22:45.067071 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:22:45.148575 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:22:45.156091 systemd[1]: Started systemd-userdbd.service. Apr 12 18:22:45.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.209829 (udev-worker)[1490]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:22:45.328172 systemd-networkd[1492]: lo: Link UP Apr 12 18:22:45.328194 systemd-networkd[1492]: lo: Gained carrier Apr 12 18:22:45.329109 systemd-networkd[1492]: Enumeration completed Apr 12 18:22:45.329290 systemd[1]: Started systemd-networkd.service. Apr 12 18:22:45.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.329325 systemd-networkd[1492]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:22:45.333456 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:22:45.340668 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:22:45.341058 systemd-networkd[1492]: eth0: Link UP Apr 12 18:22:45.341362 systemd-networkd[1492]: eth0: Gained carrier Apr 12 18:22:45.361925 systemd-networkd[1492]: eth0: DHCPv4 address 172.31.29.129/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:22:45.412669 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1494) Apr 12 18:22:45.520765 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:22:45.523519 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:22:45.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.537750 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:22:45.608242 lvm[1606]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:22:45.647209 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:22:45.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.649489 systemd[1]: Reached target cryptsetup.target. Apr 12 18:22:45.653564 systemd[1]: Starting lvm2-activation.service... Apr 12 18:22:45.662311 lvm[1607]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:22:45.697351 systemd[1]: Finished lvm2-activation.service. Apr 12 18:22:45.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.699371 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:22:45.701128 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:22:45.701184 systemd[1]: Reached target local-fs.target. Apr 12 18:22:45.702856 systemd[1]: Reached target machines.target. Apr 12 18:22:45.707164 systemd[1]: Starting ldconfig.service... Apr 12 18:22:45.709770 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:22:45.709878 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:22:45.712302 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:22:45.716937 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:22:45.724301 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:22:45.726361 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:22:45.726492 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:22:45.728873 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:22:45.737064 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1609 (bootctl) Apr 12 18:22:45.741664 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:22:45.776567 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:22:45.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.785834 systemd-tmpfiles[1612]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:22:45.792902 systemd-tmpfiles[1612]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:22:45.800308 systemd-tmpfiles[1612]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:22:45.861980 systemd-fsck[1618]: fsck.fat 4.2 (2021-01-31) Apr 12 18:22:45.861980 systemd-fsck[1618]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 18:22:45.865550 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:22:45.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:45.870542 systemd[1]: Mounting boot.mount... Apr 12 18:22:45.898971 systemd[1]: Mounted boot.mount. Apr 12 18:22:45.929531 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:22:45.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.168616 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:22:46.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.173709 systemd[1]: Starting audit-rules.service... Apr 12 18:22:46.178084 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:22:46.184048 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:22:46.186000 audit: BPF prog-id=24 op=LOAD Apr 12 18:22:46.192905 systemd[1]: Starting systemd-resolved.service... Apr 12 18:22:46.194000 audit: BPF prog-id=25 op=LOAD Apr 12 18:22:46.203982 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:22:46.208544 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:22:46.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.232141 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:22:46.235888 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:22:46.253000 audit[1643]: SYSTEM_BOOT pid=1643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.259929 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:22:46.300276 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:22:46.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:46.350000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:22:46.350000 audit[1652]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe2a95c80 a2=420 a3=0 items=0 ppid=1632 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:46.350000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:22:46.352245 augenrules[1652]: No rules Apr 12 18:22:46.353997 systemd[1]: Finished audit-rules.service. Apr 12 18:22:46.373301 systemd-resolved[1636]: Positive Trust Anchors: Apr 12 18:22:46.373327 systemd-resolved[1636]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:22:46.373392 systemd-resolved[1636]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:22:46.406436 systemd-resolved[1636]: Defaulting to hostname 'linux'. Apr 12 18:22:46.411032 systemd[1]: Started systemd-resolved.service. Apr 12 18:22:46.415020 systemd[1]: Reached target network.target. Apr 12 18:22:46.418777 systemd[1]: Reached target nss-lookup.target. Apr 12 18:22:46.420729 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:22:46.422726 systemd[1]: Reached target time-set.target. Apr 12 18:22:46.281979 systemd-timesyncd[1639]: Contacted time server 23.168.24.210:123 (0.flatcar.pool.ntp.org). Apr 12 18:22:46.404748 systemd-journald[1445]: Time jumped backwards, rotating. Apr 12 18:22:46.281980 systemd-resolved[1636]: Clock change detected. Flushing caches. Apr 12 18:22:46.282977 systemd-timesyncd[1639]: Initial clock synchronization to Fri 2024-04-12 18:22:46.281767 UTC. Apr 12 18:22:46.431326 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:22:46.432380 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:22:46.469525 ldconfig[1608]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:22:46.476666 systemd[1]: Finished ldconfig.service. Apr 12 18:22:46.480706 systemd[1]: Starting systemd-update-done.service... Apr 12 18:22:46.503858 systemd[1]: Finished systemd-update-done.service. Apr 12 18:22:46.506022 systemd[1]: Reached target sysinit.target. Apr 12 18:22:46.507949 systemd[1]: Started motdgen.path. Apr 12 18:22:46.509615 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:22:46.512263 systemd[1]: Started logrotate.timer. Apr 12 18:22:46.514114 systemd[1]: Started mdadm.timer. Apr 12 18:22:46.516403 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:22:46.518258 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:22:46.518429 systemd[1]: Reached target paths.target. Apr 12 18:22:46.520249 systemd[1]: Reached target timers.target. Apr 12 18:22:46.522436 systemd[1]: Listening on dbus.socket. Apr 12 18:22:46.526113 systemd[1]: Starting docker.socket... Apr 12 18:22:46.532473 systemd[1]: Listening on sshd.socket. Apr 12 18:22:46.534541 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:22:46.535542 systemd[1]: Listening on docker.socket. Apr 12 18:22:46.537522 systemd[1]: Reached target sockets.target. Apr 12 18:22:46.539486 systemd[1]: Reached target basic.target. Apr 12 18:22:46.541485 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:22:46.541670 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:22:46.553996 systemd[1]: Starting containerd.service... Apr 12 18:22:46.558036 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:22:46.562944 systemd[1]: Starting dbus.service... Apr 12 18:22:46.567190 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:22:46.571340 systemd[1]: Starting extend-filesystems.service... Apr 12 18:22:46.573120 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:22:46.576658 systemd[1]: Starting motdgen.service... Apr 12 18:22:46.580346 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:22:46.584196 systemd[1]: Starting prepare-critools.service... Apr 12 18:22:46.619308 jq[1667]: false Apr 12 18:22:46.589530 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:22:46.594142 systemd[1]: Starting sshd-keygen.service... Apr 12 18:22:46.603181 systemd[1]: Starting systemd-logind.service... Apr 12 18:22:46.604925 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:22:46.605168 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:22:46.606162 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:22:46.607729 systemd[1]: Starting update-engine.service... Apr 12 18:22:46.612892 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:22:46.658178 tar[1680]: ./ Apr 12 18:22:46.658178 tar[1680]: ./loopback Apr 12 18:22:46.658596 jq[1676]: true Apr 12 18:22:46.621152 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:22:46.621756 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:22:46.654559 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:22:46.654933 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:22:46.671854 tar[1681]: crictl Apr 12 18:22:46.701631 jq[1689]: true Apr 12 18:22:46.703040 extend-filesystems[1668]: Found nvme0n1 Apr 12 18:22:46.705251 extend-filesystems[1668]: Found nvme0n1p1 Apr 12 18:22:46.709149 extend-filesystems[1668]: Found nvme0n1p2 Apr 12 18:22:46.711205 extend-filesystems[1668]: Found nvme0n1p3 Apr 12 18:22:46.716062 extend-filesystems[1668]: Found usr Apr 12 18:22:46.719336 extend-filesystems[1668]: Found nvme0n1p4 Apr 12 18:22:46.721962 extend-filesystems[1668]: Found nvme0n1p6 Apr 12 18:22:46.721962 extend-filesystems[1668]: Found nvme0n1p7 Apr 12 18:22:46.721962 extend-filesystems[1668]: Found nvme0n1p9 Apr 12 18:22:46.730135 extend-filesystems[1668]: Checking size of /dev/nvme0n1p9 Apr 12 18:22:46.744119 systemd-networkd[1492]: eth0: Gained IPv6LL Apr 12 18:22:46.748282 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:22:46.750593 systemd[1]: Reached target network-online.target. Apr 12 18:22:46.754725 systemd[1]: Started amazon-ssm-agent.service. Apr 12 18:22:46.759185 systemd[1]: Started nvidia.service. Apr 12 18:22:46.803044 dbus-daemon[1666]: [system] SELinux support is enabled Apr 12 18:22:46.803348 systemd[1]: Started dbus.service. Apr 12 18:22:46.808241 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:22:46.808290 systemd[1]: Reached target system-config.target. Apr 12 18:22:46.810210 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:22:46.810249 systemd[1]: Reached target user-config.target. Apr 12 18:22:46.830479 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:22:46.830849 systemd[1]: Finished motdgen.service. Apr 12 18:22:46.899155 dbus-daemon[1666]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1492 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:22:46.904926 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:22:46.913080 extend-filesystems[1668]: Resized partition /dev/nvme0n1p9 Apr 12 18:22:46.942148 extend-filesystems[1722]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:22:46.969360 update_engine[1675]: I0412 18:22:46.968837 1675 main.cc:92] Flatcar Update Engine starting Apr 12 18:22:46.969841 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Apr 12 18:22:47.001963 systemd[1]: Started update-engine.service. Apr 12 18:22:47.003582 update_engine[1675]: I0412 18:22:47.002046 1675 update_check_scheduler.cc:74] Next update check in 6m14s Apr 12 18:22:47.006970 systemd[1]: Started locksmithd.service. Apr 12 18:22:47.060853 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Apr 12 18:22:47.122582 extend-filesystems[1722]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 18:22:47.122582 extend-filesystems[1722]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:22:47.122582 extend-filesystems[1722]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Apr 12 18:22:47.132124 extend-filesystems[1668]: Resized filesystem in /dev/nvme0n1p9 Apr 12 18:22:47.134087 amazon-ssm-agent[1705]: 2024/04/12 18:22:47 Failed to load instance info from vault. RegistrationKey does not exist. Apr 12 18:22:47.134087 amazon-ssm-agent[1705]: Initializing new seelog logger Apr 12 18:22:47.134087 amazon-ssm-agent[1705]: New Seelog Logger Creation Complete Apr 12 18:22:47.134087 amazon-ssm-agent[1705]: 2024/04/12 18:22:47 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:22:47.134087 amazon-ssm-agent[1705]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:22:47.134087 amazon-ssm-agent[1705]: 2024/04/12 18:22:47 processing appconfig overrides Apr 12 18:22:47.138427 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:22:47.138794 systemd[1]: Finished extend-filesystems.service. Apr 12 18:22:47.149119 bash[1731]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:22:47.154766 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:22:47.251554 env[1688]: time="2024-04-12T18:22:47.251465922Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:22:47.275156 tar[1680]: ./bandwidth Apr 12 18:22:47.320113 systemd-logind[1674]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:22:47.328589 systemd-logind[1674]: New seat seat0. Apr 12 18:22:47.338428 systemd[1]: Started systemd-logind.service. Apr 12 18:22:47.375422 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:22:47.471300 env[1688]: time="2024-04-12T18:22:47.471225331Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:22:47.471773 env[1688]: time="2024-04-12T18:22:47.471695719Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:47.474100 env[1688]: time="2024-04-12T18:22:47.473996755Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:22:47.474226 env[1688]: time="2024-04-12T18:22:47.474089071Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:47.478865 dbus-daemon[1666]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:22:47.479108 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:22:47.482628 dbus-daemon[1666]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1721 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:22:47.483188 env[1688]: time="2024-04-12T18:22:47.475492327Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:22:47.483188 env[1688]: time="2024-04-12T18:22:47.483101335Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:47.487502 systemd[1]: Starting polkit.service... Apr 12 18:22:47.492329 env[1688]: time="2024-04-12T18:22:47.492233467Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:22:47.492329 env[1688]: time="2024-04-12T18:22:47.492320191Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:47.495519 env[1688]: time="2024-04-12T18:22:47.495429895Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:47.496260 env[1688]: time="2024-04-12T18:22:47.496196755Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:22:47.496762 env[1688]: time="2024-04-12T18:22:47.496674091Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:22:47.496762 env[1688]: time="2024-04-12T18:22:47.496754215Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:22:47.497059 env[1688]: time="2024-04-12T18:22:47.496987843Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:22:47.497158 env[1688]: time="2024-04-12T18:22:47.497054719Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:22:47.521575 env[1688]: time="2024-04-12T18:22:47.521502631Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:22:47.521724 env[1688]: time="2024-04-12T18:22:47.521580523Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:22:47.521724 env[1688]: time="2024-04-12T18:22:47.521617615Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:22:47.521885 env[1688]: time="2024-04-12T18:22:47.521719255Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.521885 env[1688]: time="2024-04-12T18:22:47.521868991Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.521985 env[1688]: time="2024-04-12T18:22:47.521907079Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.521985 env[1688]: time="2024-04-12T18:22:47.521940859Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.522528 env[1688]: time="2024-04-12T18:22:47.522461539Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.522637 env[1688]: time="2024-04-12T18:22:47.522530071Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.522637 env[1688]: time="2024-04-12T18:22:47.522565759Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.522637 env[1688]: time="2024-04-12T18:22:47.522597451Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.522804 env[1688]: time="2024-04-12T18:22:47.522634663Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:22:47.522935 env[1688]: time="2024-04-12T18:22:47.522892159Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:22:47.523123 env[1688]: time="2024-04-12T18:22:47.523083151Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:22:47.523778 env[1688]: time="2024-04-12T18:22:47.523727203Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:22:47.523879 env[1688]: time="2024-04-12T18:22:47.523791547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.523879 env[1688]: time="2024-04-12T18:22:47.523842007Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:22:47.524085 env[1688]: time="2024-04-12T18:22:47.523960723Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524140 env[1688]: time="2024-04-12T18:22:47.523998031Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524140 env[1688]: time="2024-04-12T18:22:47.524124415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524238 env[1688]: time="2024-04-12T18:22:47.524156875Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524238 env[1688]: time="2024-04-12T18:22:47.524187163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524238 env[1688]: time="2024-04-12T18:22:47.524217175Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524385 env[1688]: time="2024-04-12T18:22:47.524245711Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524385 env[1688]: time="2024-04-12T18:22:47.524276911Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524385 env[1688]: time="2024-04-12T18:22:47.524318395Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:22:47.524641 env[1688]: time="2024-04-12T18:22:47.524595511Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524709 env[1688]: time="2024-04-12T18:22:47.524645263Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524709 env[1688]: time="2024-04-12T18:22:47.524678215Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.524805 env[1688]: time="2024-04-12T18:22:47.524707483Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:22:47.524805 env[1688]: time="2024-04-12T18:22:47.524739859Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:22:47.524805 env[1688]: time="2024-04-12T18:22:47.524767615Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:22:47.527551 polkitd[1781]: Started polkitd version 121 Apr 12 18:22:47.532792 env[1688]: time="2024-04-12T18:22:47.524804371Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:22:47.532987 env[1688]: time="2024-04-12T18:22:47.532912315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:22:47.533568 env[1688]: time="2024-04-12T18:22:47.533426083Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:22:47.534634 env[1688]: time="2024-04-12T18:22:47.533590231Z" level=info msg="Connect containerd service" Apr 12 18:22:47.534634 env[1688]: time="2024-04-12T18:22:47.533728459Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:22:47.535516 env[1688]: time="2024-04-12T18:22:47.535452991Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.535761607Z" level=info msg="Start subscribing containerd event" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.535850179Z" level=info msg="Start recovering state" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.535963747Z" level=info msg="Start event monitor" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.536003551Z" level=info msg="Start snapshots syncer" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.536028535Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.536048107Z" level=info msg="Start streaming server" Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.536086771Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:22:47.537981 env[1688]: time="2024-04-12T18:22:47.536225899Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:22:47.536469 systemd[1]: Started containerd.service. Apr 12 18:22:47.539505 env[1688]: time="2024-04-12T18:22:47.539411599Z" level=info msg="containerd successfully booted in 0.290890s" Apr 12 18:22:47.560143 polkitd[1781]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:22:47.582473 polkitd[1781]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:22:47.589858 polkitd[1781]: Finished loading, compiling and executing 2 rules Apr 12 18:22:47.591111 dbus-daemon[1666]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:22:47.591373 systemd[1]: Started polkit.service. Apr 12 18:22:47.594107 polkitd[1781]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:22:47.602468 tar[1680]: ./ptp Apr 12 18:22:47.625532 systemd-hostnamed[1721]: Hostname set to (transient) Apr 12 18:22:47.625711 systemd-resolved[1636]: System hostname changed to 'ip-172-31-29-129'. Apr 12 18:22:47.773156 tar[1680]: ./vlan Apr 12 18:22:47.792012 coreos-metadata[1665]: Apr 12 18:22:47.791 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:22:47.794973 coreos-metadata[1665]: Apr 12 18:22:47.794 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Apr 12 18:22:47.807437 coreos-metadata[1665]: Apr 12 18:22:47.807 INFO Fetch successful Apr 12 18:22:47.807743 coreos-metadata[1665]: Apr 12 18:22:47.807 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:22:47.808924 coreos-metadata[1665]: Apr 12 18:22:47.808 INFO Fetch successful Apr 12 18:22:47.814153 unknown[1665]: wrote ssh authorized keys file for user: core Apr 12 18:22:47.844212 update-ssh-keys[1831]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:22:47.845309 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:22:47.924655 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Create new startup processor Apr 12 18:22:47.940191 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [LongRunningPluginsManager] registered plugins: {} Apr 12 18:22:47.943970 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing bookkeeping folders Apr 12 18:22:47.948325 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO removing the completed state files Apr 12 18:22:47.948500 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing bookkeeping folders for long running plugins Apr 12 18:22:47.948615 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Apr 12 18:22:47.948743 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing healthcheck folders for long running plugins Apr 12 18:22:47.948873 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing locations for inventory plugin Apr 12 18:22:47.948984 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing default location for custom inventory Apr 12 18:22:47.949094 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing default location for file inventory Apr 12 18:22:47.949220 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Initializing default location for role inventory Apr 12 18:22:47.949329 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Init the cloudwatchlogs publisher Apr 12 18:22:47.949440 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:runPowerShellScript Apr 12 18:22:47.949550 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:refreshAssociation Apr 12 18:22:47.949663 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:configurePackage Apr 12 18:22:47.949793 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:downloadContent Apr 12 18:22:47.949938 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:runDocument Apr 12 18:22:47.950048 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:softwareInventory Apr 12 18:22:47.950157 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:updateSsmAgent Apr 12 18:22:47.950265 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:configureDocker Apr 12 18:22:47.950390 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform independent plugin aws:runDockerAction Apr 12 18:22:47.950501 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Successfully loaded platform dependent plugin aws:runShellScript Apr 12 18:22:47.950610 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Apr 12 18:22:47.950720 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO OS: linux, Arch: arm64 Apr 12 18:22:47.951499 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] Starting document processing engine... Apr 12 18:22:47.954856 amazon-ssm-agent[1705]: datastore file /var/lib/amazon/ssm/i-0ffcc79831956a67b/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Apr 12 18:22:47.994532 tar[1680]: ./host-device Apr 12 18:22:48.050141 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [EngineProcessor] Starting Apr 12 18:22:48.133884 tar[1680]: ./tuning Apr 12 18:22:48.145026 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Apr 12 18:22:48.205186 tar[1680]: ./vrf Apr 12 18:22:48.239586 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] Starting message polling Apr 12 18:22:48.280331 tar[1680]: ./sbr Apr 12 18:22:48.334290 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] Starting send replies to MDS Apr 12 18:22:48.370694 tar[1680]: ./tap Apr 12 18:22:48.429225 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [instanceID=i-0ffcc79831956a67b] Starting association polling Apr 12 18:22:48.447364 tar[1680]: ./dhcp Apr 12 18:22:48.524388 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Apr 12 18:22:48.619662 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [Association] Launching response handler Apr 12 18:22:48.658475 tar[1680]: ./static Apr 12 18:22:48.715475 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Apr 12 18:22:48.743608 tar[1680]: ./firewall Apr 12 18:22:48.811233 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Apr 12 18:22:48.828541 systemd[1]: Finished prepare-critools.service. Apr 12 18:22:48.848976 tar[1680]: ./macvlan Apr 12 18:22:48.906769 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Apr 12 18:22:48.913673 tar[1680]: ./dummy Apr 12 18:22:48.978622 tar[1680]: ./bridge Apr 12 18:22:49.002871 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:22:49.047057 tar[1680]: ./ipvlan Apr 12 18:22:49.099193 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessageGatewayService] Starting session document processing engine... Apr 12 18:22:49.109672 tar[1680]: ./portmap Apr 12 18:22:49.171654 tar[1680]: ./host-local Apr 12 18:22:49.195599 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessageGatewayService] [EngineProcessor] Starting Apr 12 18:22:49.256076 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:22:49.292292 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Apr 12 18:22:49.360951 locksmithd[1730]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:22:49.389148 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ffcc79831956a67b, requestId: b331e3de-f122-4ec5-aa3b-97db90e44acd Apr 12 18:22:49.486248 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [OfflineService] Starting document processing engine... Apr 12 18:22:49.583556 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [OfflineService] [EngineProcessor] Starting Apr 12 18:22:49.680983 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [OfflineService] [EngineProcessor] Initial processing Apr 12 18:22:49.778654 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [OfflineService] Starting message polling Apr 12 18:22:49.876555 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [OfflineService] Starting send replies to MDS Apr 12 18:22:49.974669 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [LongRunningPluginsManager] starting long running plugin manager Apr 12 18:22:50.072908 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Apr 12 18:22:50.171377 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [MessageGatewayService] listening reply. Apr 12 18:22:50.270041 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Apr 12 18:22:50.368869 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [StartupProcessor] Executing startup processor tasks Apr 12 18:22:50.467972 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Apr 12 18:22:50.567294 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Apr 12 18:22:50.666700 amazon-ssm-agent[1705]: 2024-04-12 18:22:47 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.3 Apr 12 18:22:50.766353 amazon-ssm-agent[1705]: 2024-04-12 18:22:48 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ffcc79831956a67b?role=subscribe&stream=input Apr 12 18:22:50.866288 amazon-ssm-agent[1705]: 2024-04-12 18:22:48 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ffcc79831956a67b?role=subscribe&stream=input Apr 12 18:22:50.966169 amazon-ssm-agent[1705]: 2024-04-12 18:22:48 INFO [MessageGatewayService] Starting receiving message from control channel Apr 12 18:22:51.066402 amazon-ssm-agent[1705]: 2024-04-12 18:22:48 INFO [MessageGatewayService] [EngineProcessor] Initial processing Apr 12 18:22:53.070430 sshd_keygen[1697]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:22:53.106087 systemd[1]: Finished sshd-keygen.service. Apr 12 18:22:53.110747 systemd[1]: Starting issuegen.service... Apr 12 18:22:53.121394 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:22:53.121762 systemd[1]: Finished issuegen.service. Apr 12 18:22:53.126587 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:22:53.140285 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:22:53.145011 systemd[1]: Started getty@tty1.service. Apr 12 18:22:53.149419 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:22:53.151686 systemd[1]: Reached target getty.target. Apr 12 18:22:53.153543 systemd[1]: Reached target multi-user.target. Apr 12 18:22:53.158263 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:22:53.172312 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:22:53.172681 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:22:53.174912 systemd[1]: Startup finished in 1.139s (kernel) + 11.294s (initrd) + 14.700s (userspace) = 27.134s. Apr 12 18:22:54.050956 amazon-ssm-agent[1705]: 2024-04-12 18:22:54 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Apr 12 18:22:55.343776 systemd[1]: Created slice system-sshd.slice. Apr 12 18:22:55.346143 systemd[1]: Started sshd@0-172.31.29.129:22-139.178.89.65:50776.service. Apr 12 18:22:55.522981 sshd[1877]: Accepted publickey for core from 139.178.89.65 port 50776 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:55.526838 sshd[1877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:55.544909 systemd[1]: Created slice user-500.slice. Apr 12 18:22:55.547537 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:22:55.552192 systemd-logind[1674]: New session 1 of user core. Apr 12 18:22:55.565567 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:22:55.569540 systemd[1]: Starting user@500.service... Apr 12 18:22:55.576812 (systemd)[1880]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:55.752481 systemd[1880]: Queued start job for default target default.target. Apr 12 18:22:55.755599 systemd[1880]: Reached target paths.target. Apr 12 18:22:55.755811 systemd[1880]: Reached target sockets.target. Apr 12 18:22:55.755988 systemd[1880]: Reached target timers.target. Apr 12 18:22:55.756154 systemd[1880]: Reached target basic.target. Apr 12 18:22:55.756359 systemd[1880]: Reached target default.target. Apr 12 18:22:55.756456 systemd[1]: Started user@500.service. Apr 12 18:22:55.757114 systemd[1880]: Startup finished in 168ms. Apr 12 18:22:55.759215 systemd[1]: Started session-1.scope. Apr 12 18:22:55.903940 systemd[1]: Started sshd@1-172.31.29.129:22-139.178.89.65:50782.service. Apr 12 18:22:56.078657 sshd[1889]: Accepted publickey for core from 139.178.89.65 port 50782 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:56.081082 sshd[1889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:56.090224 systemd[1]: Started session-2.scope. Apr 12 18:22:56.091070 systemd-logind[1674]: New session 2 of user core. Apr 12 18:22:56.222297 sshd[1889]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:56.227597 systemd-logind[1674]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:22:56.229133 systemd[1]: sshd@1-172.31.29.129:22-139.178.89.65:50782.service: Deactivated successfully. Apr 12 18:22:56.230438 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:22:56.231908 systemd-logind[1674]: Removed session 2. Apr 12 18:22:56.251493 systemd[1]: Started sshd@2-172.31.29.129:22-139.178.89.65:50796.service. Apr 12 18:22:56.426397 sshd[1895]: Accepted publickey for core from 139.178.89.65 port 50796 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:56.428775 sshd[1895]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:56.437589 systemd[1]: Started session-3.scope. Apr 12 18:22:56.438912 systemd-logind[1674]: New session 3 of user core. Apr 12 18:22:56.562190 sshd[1895]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:56.566816 systemd[1]: sshd@2-172.31.29.129:22-139.178.89.65:50796.service: Deactivated successfully. Apr 12 18:22:56.568100 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:22:56.569289 systemd-logind[1674]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:22:56.571523 systemd-logind[1674]: Removed session 3. Apr 12 18:22:56.589048 systemd[1]: Started sshd@3-172.31.29.129:22-139.178.89.65:50812.service. Apr 12 18:22:56.756280 sshd[1901]: Accepted publickey for core from 139.178.89.65 port 50812 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:56.760058 sshd[1901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:56.768712 systemd[1]: Started session-4.scope. Apr 12 18:22:56.769650 systemd-logind[1674]: New session 4 of user core. Apr 12 18:22:56.899812 sshd[1901]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:56.905607 systemd[1]: sshd@3-172.31.29.129:22-139.178.89.65:50812.service: Deactivated successfully. Apr 12 18:22:56.906683 systemd-logind[1674]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:22:56.906944 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:22:56.908588 systemd-logind[1674]: Removed session 4. Apr 12 18:22:56.930857 systemd[1]: Started sshd@4-172.31.29.129:22-139.178.89.65:50818.service. Apr 12 18:22:57.101190 sshd[1907]: Accepted publickey for core from 139.178.89.65 port 50818 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:57.103973 sshd[1907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:57.112778 systemd[1]: Started session-5.scope. Apr 12 18:22:57.113738 systemd-logind[1674]: New session 5 of user core. Apr 12 18:22:57.228577 sudo[1910]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:22:57.229102 sudo[1910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:57.246107 dbus-daemon[1666]: avc: received setenforce notice (enforcing=1) Apr 12 18:22:57.248791 sudo[1910]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:57.273070 sshd[1907]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:57.278250 systemd-logind[1674]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:22:57.278930 systemd[1]: sshd@4-172.31.29.129:22-139.178.89.65:50818.service: Deactivated successfully. Apr 12 18:22:57.280188 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:22:57.281738 systemd-logind[1674]: Removed session 5. Apr 12 18:22:57.303537 systemd[1]: Started sshd@5-172.31.29.129:22-139.178.89.65:48910.service. Apr 12 18:22:57.475774 sshd[1914]: Accepted publickey for core from 139.178.89.65 port 48910 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:57.478803 sshd[1914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:57.486909 systemd[1]: Started session-6.scope. Apr 12 18:22:57.488940 systemd-logind[1674]: New session 6 of user core. Apr 12 18:22:57.594479 sudo[1918]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:22:57.595462 sudo[1918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:57.600886 sudo[1918]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:57.609941 sudo[1917]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:22:57.610936 sudo[1917]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:57.628131 systemd[1]: Stopping audit-rules.service... Apr 12 18:22:57.629000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:22:57.632107 kernel: kauditd_printk_skb: 66 callbacks suppressed Apr 12 18:22:57.632170 kernel: audit: type=1305 audit(1712946177.629:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:22:57.633165 auditctl[1921]: No rules Apr 12 18:22:57.637746 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:22:57.629000 audit[1921]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff42f8680 a2=420 a3=0 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.638143 systemd[1]: Stopped audit-rules.service. Apr 12 18:22:57.656863 kernel: audit: type=1300 audit(1712946177.629:158): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff42f8680 a2=420 a3=0 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.656967 kernel: audit: type=1327 audit(1712946177.629:158): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:22:57.657009 kernel: audit: type=1131 audit(1712946177.637:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.629000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:22:57.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.649573 systemd[1]: Starting audit-rules.service... Apr 12 18:22:57.682728 augenrules[1938]: No rules Apr 12 18:22:57.684280 systemd[1]: Finished audit-rules.service. Apr 12 18:22:57.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.686524 sudo[1917]: pam_unix(sudo:session): session closed for user root Apr 12 18:22:57.685000 audit[1917]: USER_END pid=1917 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.702969 kernel: audit: type=1130 audit(1712946177.683:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.703035 kernel: audit: type=1106 audit(1712946177.685:161): pid=1917 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.685000 audit[1917]: CRED_DISP pid=1917 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.710990 kernel: audit: type=1104 audit(1712946177.685:162): pid=1917 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.716138 sshd[1914]: pam_unix(sshd:session): session closed for user core Apr 12 18:22:57.717000 audit[1914]: USER_END pid=1914 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.721978 systemd-logind[1674]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:22:57.723399 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:22:57.724454 systemd[1]: sshd@5-172.31.29.129:22-139.178.89.65:48910.service: Deactivated successfully. Apr 12 18:22:57.726975 systemd-logind[1674]: Removed session 6. Apr 12 18:22:57.717000 audit[1914]: CRED_DISP pid=1914 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.738726 kernel: audit: type=1106 audit(1712946177.717:163): pid=1914 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.740577 kernel: audit: type=1104 audit(1712946177.717:164): pid=1914 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.740669 kernel: audit: type=1131 audit(1712946177.723:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.129:22-139.178.89.65:48910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.129:22-139.178.89.65:48910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.748141 systemd[1]: Started sshd@6-172.31.29.129:22-139.178.89.65:48914.service. Apr 12 18:22:57.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.129:22-139.178.89.65:48914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:57.915000 audit[1944]: USER_ACCT pid=1944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.917040 sshd[1944]: Accepted publickey for core from 139.178.89.65 port 48914 ssh2: RSA SHA256:RkreMDY4vm0NHGuZyACqO02N2uRrqppl3JmzNQboRtE Apr 12 18:22:57.917000 audit[1944]: CRED_ACQ pid=1944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.918000 audit[1944]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7d635e0 a2=3 a3=1 items=0 ppid=1 pid=1944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:22:57.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:22:57.919942 sshd[1944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:22:57.927687 systemd-logind[1674]: New session 7 of user core. Apr 12 18:22:57.928667 systemd[1]: Started session-7.scope. Apr 12 18:22:57.936000 audit[1944]: USER_START pid=1944 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:57.939000 audit[1946]: CRED_ACQ pid=1946 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:22:58.032000 audit[1947]: USER_ACCT pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:58.033610 sudo[1947]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:22:58.033000 audit[1947]: CRED_REFR pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:58.034778 sudo[1947]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:22:58.036000 audit[1947]: USER_START pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:22:58.691904 systemd[1]: Reloading. Apr 12 18:22:58.832279 /usr/lib/systemd/system-generators/torcx-generator[1979]: time="2024-04-12T18:22:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:22:58.832884 /usr/lib/systemd/system-generators/torcx-generator[1979]: time="2024-04-12T18:22:58Z" level=info msg="torcx already run" Apr 12 18:22:58.984778 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:22:58.984858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:22:59.028469 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:22:59.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.193000 audit: BPF prog-id=34 op=LOAD Apr 12 18:22:59.193000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit: BPF prog-id=35 op=LOAD Apr 12 18:22:59.194000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit: BPF prog-id=36 op=LOAD Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.195000 audit: BPF prog-id=37 op=LOAD Apr 12 18:22:59.195000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:22:59.195000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit: BPF prog-id=38 op=LOAD Apr 12 18:22:59.197000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit: BPF prog-id=39 op=LOAD Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.198000 audit: BPF prog-id=40 op=LOAD Apr 12 18:22:59.198000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:22:59.198000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.199000 audit: BPF prog-id=41 op=LOAD Apr 12 18:22:59.199000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit: BPF prog-id=42 op=LOAD Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.200000 audit: BPF prog-id=43 op=LOAD Apr 12 18:22:59.200000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:22:59.200000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.203000 audit: BPF prog-id=44 op=LOAD Apr 12 18:22:59.203000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.208000 audit: BPF prog-id=45 op=LOAD Apr 12 18:22:59.209000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit: BPF prog-id=46 op=LOAD Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.209000 audit: BPF prog-id=47 op=LOAD Apr 12 18:22:59.209000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:22:59.209000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.218000 audit: BPF prog-id=48 op=LOAD Apr 12 18:22:59.218000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit: BPF prog-id=49 op=LOAD Apr 12 18:22:59.220000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit: BPF prog-id=50 op=LOAD Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:22:59.220000 audit: BPF prog-id=51 op=LOAD Apr 12 18:22:59.220000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:22:59.220000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:22:59.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:59.239727 systemd[1]: Started kubelet.service. Apr 12 18:22:59.265508 systemd[1]: Starting coreos-metadata.service... Apr 12 18:22:59.368348 kubelet[2032]: E0412 18:22:59.368208 2032 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:22:59.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:22:59.372932 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:22:59.373245 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:22:59.443671 coreos-metadata[2040]: Apr 12 18:22:59.443 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:22:59.444738 coreos-metadata[2040]: Apr 12 18:22:59.444 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Apr 12 18:22:59.445555 coreos-metadata[2040]: Apr 12 18:22:59.445 INFO Fetch successful Apr 12 18:22:59.445668 coreos-metadata[2040]: Apr 12 18:22:59.445 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Apr 12 18:22:59.446324 coreos-metadata[2040]: Apr 12 18:22:59.446 INFO Fetch successful Apr 12 18:22:59.446407 coreos-metadata[2040]: Apr 12 18:22:59.446 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Apr 12 18:22:59.447063 coreos-metadata[2040]: Apr 12 18:22:59.446 INFO Fetch successful Apr 12 18:22:59.447161 coreos-metadata[2040]: Apr 12 18:22:59.447 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Apr 12 18:22:59.448076 coreos-metadata[2040]: Apr 12 18:22:59.447 INFO Fetch successful Apr 12 18:22:59.448376 coreos-metadata[2040]: Apr 12 18:22:59.448 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Apr 12 18:22:59.448710 coreos-metadata[2040]: Apr 12 18:22:59.448 INFO Fetch successful Apr 12 18:22:59.449029 coreos-metadata[2040]: Apr 12 18:22:59.448 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Apr 12 18:22:59.449420 coreos-metadata[2040]: Apr 12 18:22:59.449 INFO Fetch successful Apr 12 18:22:59.449721 coreos-metadata[2040]: Apr 12 18:22:59.449 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Apr 12 18:22:59.450153 coreos-metadata[2040]: Apr 12 18:22:59.449 INFO Fetch successful Apr 12 18:22:59.450413 coreos-metadata[2040]: Apr 12 18:22:59.450 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Apr 12 18:22:59.450866 coreos-metadata[2040]: Apr 12 18:22:59.450 INFO Fetch successful Apr 12 18:22:59.464811 systemd[1]: Finished coreos-metadata.service. Apr 12 18:22:59.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:59.918553 systemd[1]: Stopped kubelet.service. Apr 12 18:22:59.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:59.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:22:59.948598 systemd[1]: Reloading. Apr 12 18:23:00.094361 /usr/lib/systemd/system-generators/torcx-generator[2099]: time="2024-04-12T18:23:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:23:00.094426 /usr/lib/systemd/system-generators/torcx-generator[2099]: time="2024-04-12T18:23:00Z" level=info msg="torcx already run" Apr 12 18:23:00.225712 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:23:00.225751 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:23:00.264347 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.421000 audit: BPF prog-id=52 op=LOAD Apr 12 18:23:00.421000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit: BPF prog-id=53 op=LOAD Apr 12 18:23:00.422000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit: BPF prog-id=54 op=LOAD Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.423000 audit: BPF prog-id=55 op=LOAD Apr 12 18:23:00.423000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:23:00.423000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.424000 audit: BPF prog-id=56 op=LOAD Apr 12 18:23:00.424000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit: BPF prog-id=57 op=LOAD Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.425000 audit: BPF prog-id=58 op=LOAD Apr 12 18:23:00.425000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:23:00.425000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit: BPF prog-id=59 op=LOAD Apr 12 18:23:00.426000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit: BPF prog-id=60 op=LOAD Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.426000 audit: BPF prog-id=61 op=LOAD Apr 12 18:23:00.426000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:23:00.426000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.429000 audit: BPF prog-id=62 op=LOAD Apr 12 18:23:00.429000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit: BPF prog-id=63 op=LOAD Apr 12 18:23:00.434000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit: BPF prog-id=64 op=LOAD Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.434000 audit: BPF prog-id=65 op=LOAD Apr 12 18:23:00.434000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:23:00.434000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.443000 audit: BPF prog-id=66 op=LOAD Apr 12 18:23:00.443000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit: BPF prog-id=67 op=LOAD Apr 12 18:23:00.444000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit: BPF prog-id=68 op=LOAD Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:00.445000 audit: BPF prog-id=69 op=LOAD Apr 12 18:23:00.445000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:23:00.445000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:23:00.474521 systemd[1]: Started kubelet.service. Apr 12 18:23:00.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:00.563926 kubelet[2152]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:23:00.563926 kubelet[2152]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:23:00.563926 kubelet[2152]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:23:00.569772 kubelet[2152]: I0412 18:23:00.569682 2152 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:23:01.618074 kubelet[2152]: I0412 18:23:01.618027 2152 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:23:01.618074 kubelet[2152]: I0412 18:23:01.618071 2152 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:23:01.618653 kubelet[2152]: I0412 18:23:01.618416 2152 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:23:01.623984 kubelet[2152]: I0412 18:23:01.623942 2152 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:23:01.632360 kubelet[2152]: W0412 18:23:01.632321 2152 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:23:01.633430 kubelet[2152]: I0412 18:23:01.633393 2152 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:23:01.633913 kubelet[2152]: I0412 18:23:01.633885 2152 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:23:01.634160 kubelet[2152]: I0412 18:23:01.634130 2152 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:23:01.634323 kubelet[2152]: I0412 18:23:01.634173 2152 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:23:01.634323 kubelet[2152]: I0412 18:23:01.634194 2152 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:23:01.634453 kubelet[2152]: I0412 18:23:01.634354 2152 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:23:01.634599 kubelet[2152]: I0412 18:23:01.634572 2152 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:23:01.634679 kubelet[2152]: I0412 18:23:01.634611 2152 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:23:01.634679 kubelet[2152]: I0412 18:23:01.634646 2152 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:23:01.634679 kubelet[2152]: I0412 18:23:01.634677 2152 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:23:01.635511 kubelet[2152]: E0412 18:23:01.635460 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:01.636286 kubelet[2152]: E0412 18:23:01.635558 2152 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:01.636861 kubelet[2152]: I0412 18:23:01.636815 2152 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:23:01.637485 kubelet[2152]: W0412 18:23:01.637463 2152 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:23:01.638650 kubelet[2152]: I0412 18:23:01.638619 2152 server.go:1232] "Started kubelet" Apr 12 18:23:01.640791 kubelet[2152]: I0412 18:23:01.640720 2152 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:23:01.645671 kubelet[2152]: I0412 18:23:01.645612 2152 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:23:01.651000 audit[2152]: AVC avc: denied { mac_admin } for pid=2152 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:01.651000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:23:01.651000 audit[2152]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d219e0 a1=4000d22918 a2=4000d219b0 a3=25 items=0 ppid=1 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.651000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:23:01.651000 audit[2152]: AVC avc: denied { mac_admin } for pid=2152 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:01.651000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:23:01.651000 audit[2152]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dbcba0 a1=4000d22930 a2=4000d21a70 a3=25 items=0 ppid=1 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.651000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:23:01.652652 kubelet[2152]: I0412 18:23:01.652088 2152 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:23:01.652652 kubelet[2152]: I0412 18:23:01.652198 2152 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:23:01.652652 kubelet[2152]: I0412 18:23:01.652316 2152 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:23:01.654700 kubelet[2152]: I0412 18:23:01.641102 2152 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:23:01.655087 kubelet[2152]: I0412 18:23:01.655048 2152 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:23:01.657032 kubelet[2152]: I0412 18:23:01.656979 2152 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:23:01.657534 kubelet[2152]: I0412 18:23:01.657491 2152 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:23:01.657672 kubelet[2152]: I0412 18:23:01.657640 2152 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:23:01.659070 kubelet[2152]: E0412 18:23:01.658552 2152 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:23:01.659070 kubelet[2152]: E0412 18:23:01.658603 2152 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:23:01.661926 kubelet[2152]: E0412 18:23:01.661634 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a03ee04d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 638587605, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 638587605, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.690036 kubelet[2152]: E0412 18:23:01.689986 2152 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.29.129\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:23:01.690195 kubelet[2152]: W0412 18:23:01.690078 2152 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:23:01.690195 kubelet[2152]: E0412 18:23:01.690115 2152 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:23:01.690410 kubelet[2152]: W0412 18:23:01.690208 2152 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:23:01.690410 kubelet[2152]: E0412 18:23:01.690232 2152 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:23:01.690410 kubelet[2152]: W0412 18:23:01.690338 2152 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.29.129" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:23:01.690410 kubelet[2152]: E0412 18:23:01.690360 2152 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.29.129" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:23:01.690627 kubelet[2152]: E0412 18:23:01.690451 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a051f25fd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 658584573, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 658584573, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.718511 kubelet[2152]: I0412 18:23:01.718428 2152 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:23:01.718511 kubelet[2152]: I0412 18:23:01.718518 2152 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:23:01.718708 kubelet[2152]: I0412 18:23:01.718557 2152 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:23:01.720035 kubelet[2152]: E0412 18:23:01.719915 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a0897070e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.29.129 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716772622, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716772622, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.721937 kubelet[2152]: I0412 18:23:01.721889 2152 policy_none.go:49] "None policy: Start" Apr 12 18:23:01.722451 kubelet[2152]: E0412 18:23:01.722252 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a089723ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.29.129 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716779978, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716779978, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.724332 kubelet[2152]: I0412 18:23:01.724302 2152 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:23:01.724506 kubelet[2152]: I0412 18:23:01.724485 2152 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:23:01.725266 kubelet[2152]: E0412 18:23:01.725145 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a08973f36", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.29.129 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716786998, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716786998, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.731000 audit[2167]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.731000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcafc5600 a2=0 a3=1 items=0 ppid=2152 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:23:01.735000 audit[2170]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.735000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc05e48c0 a2=0 a3=1 items=0 ppid=2152 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:23:01.736088 systemd[1]: Created slice kubepods.slice. Apr 12 18:23:01.757310 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:23:01.759229 kubelet[2152]: I0412 18:23:01.759177 2152 kubelet_node_status.go:70] "Attempting to register node" node="172.31.29.129" Apr 12 18:23:01.762318 kubelet[2152]: E0412 18:23:01.762245 2152 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.29.129" Apr 12 18:23:01.763353 kubelet[2152]: E0412 18:23:01.763208 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a0897070e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.29.129 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716772622, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 759117982, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a0897070e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.767982 kubelet[2152]: E0412 18:23:01.766070 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a089723ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.29.129 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716779978, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 759129814, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a089723ca" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.767710 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:23:01.771085 kubelet[2152]: E0412 18:23:01.770811 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a08973f36", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.29.129 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716786998, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 759134374, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a08973f36" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.739000 audit[2172]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.739000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff5509620 a2=0 a3=1 items=0 ppid=2152 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:23:01.776074 kubelet[2152]: I0412 18:23:01.776028 2152 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:23:01.775000 audit[2152]: AVC avc: denied { mac_admin } for pid=2152 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:01.775000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:23:01.775000 audit[2152]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e07440 a1=4000f265e8 a2=4000e07410 a3=25 items=0 ppid=1 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.775000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:23:01.776499 kubelet[2152]: I0412 18:23:01.776186 2152 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:23:01.776562 kubelet[2152]: I0412 18:23:01.776523 2152 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:23:01.780187 kubelet[2152]: E0412 18:23:01.780142 2152 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.29.129\" not found" Apr 12 18:23:01.783400 kubelet[2152]: E0412 18:23:01.782256 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a0c552c7e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 779565694, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 779565694, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.784000 audit[2178]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.784000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe8d86b70 a2=0 a3=1 items=0 ppid=2152 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:23:01.843000 audit[2183]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.843000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffce039080 a2=0 a3=1 items=0 ppid=2152 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:23:01.844797 kubelet[2152]: I0412 18:23:01.844757 2152 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:23:01.845000 audit[2184]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.845000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff9d4400 a2=0 a3=1 items=0 ppid=2152 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:23:01.846000 audit[2185]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:01.846000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb0935f0 a2=0 a3=1 items=0 ppid=2152 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:23:01.849105 kubelet[2152]: I0412 18:23:01.849044 2152 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:23:01.849105 kubelet[2152]: I0412 18:23:01.849105 2152 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:23:01.849379 kubelet[2152]: I0412 18:23:01.849137 2152 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:23:01.849379 kubelet[2152]: E0412 18:23:01.849220 2152 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:23:01.851634 kubelet[2152]: W0412 18:23:01.851600 2152 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:23:01.851907 kubelet[2152]: E0412 18:23:01.851883 2152 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:23:01.850000 audit[2186]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.850000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcfe659c0 a2=0 a3=1 items=0 ppid=2152 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:23:01.852000 audit[2187]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:01.852000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9d38840 a2=0 a3=1 items=0 ppid=2152 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:23:01.853000 audit[2188]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:01.853000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd37a6bb0 a2=0 a3=1 items=0 ppid=2152 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:23:01.855000 audit[2189]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:01.855000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcf6a88d0 a2=0 a3=1 items=0 ppid=2152 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:23:01.857000 audit[2190]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:01.857000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff6ee5f70 a2=0 a3=1 items=0 ppid=2152 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:01.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:23:01.892378 kubelet[2152]: E0412 18:23:01.892249 2152 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.29.129\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:23:01.963732 kubelet[2152]: I0412 18:23:01.963690 2152 kubelet_node_status.go:70] "Attempting to register node" node="172.31.29.129" Apr 12 18:23:01.965403 kubelet[2152]: E0412 18:23:01.965368 2152 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.29.129" Apr 12 18:23:01.965566 kubelet[2152]: E0412 18:23:01.965469 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a0897070e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.29.129 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716772622, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 963634067, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a0897070e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.967165 kubelet[2152]: E0412 18:23:01.967066 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a089723ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.29.129 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716779978, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 963641843, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a089723ca" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:01.969248 kubelet[2152]: E0412 18:23:01.969152 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a08973f36", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.29.129 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716786998, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 963652835, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a08973f36" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:02.294343 kubelet[2152]: E0412 18:23:02.294300 2152 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.29.129\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:23:02.366635 kubelet[2152]: I0412 18:23:02.366587 2152 kubelet_node_status.go:70] "Attempting to register node" node="172.31.29.129" Apr 12 18:23:02.368107 kubelet[2152]: E0412 18:23:02.368075 2152 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.29.129" Apr 12 18:23:02.368955 kubelet[2152]: E0412 18:23:02.368806 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a0897070e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.29.129 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716772622, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 2, 366532389, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a0897070e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:02.370493 kubelet[2152]: E0412 18:23:02.370396 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a089723ca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.29.129 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716779978, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 2, 366547341, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a089723ca" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:02.371973 kubelet[2152]: E0412 18:23:02.371873 2152 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129.17c59b7a08973f36", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.29.129", UID:"172.31.29.129", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.29.129 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.29.129"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 23, 1, 716786998, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 23, 2, 366551961, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.29.129"}': 'events "172.31.29.129.17c59b7a08973f36" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:23:02.624043 kubelet[2152]: I0412 18:23:02.623875 2152 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:23:02.637297 kubelet[2152]: E0412 18:23:02.637245 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:03.104205 kubelet[2152]: E0412 18:23:03.104170 2152 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.29.129\" not found" node="172.31.29.129" Apr 12 18:23:03.119291 kubelet[2152]: E0412 18:23:03.119265 2152 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.29.129" not found Apr 12 18:23:03.169940 kubelet[2152]: I0412 18:23:03.169895 2152 kubelet_node_status.go:70] "Attempting to register node" node="172.31.29.129" Apr 12 18:23:03.177933 kubelet[2152]: I0412 18:23:03.177885 2152 kubelet_node_status.go:73] "Successfully registered node" node="172.31.29.129" Apr 12 18:23:03.326403 kubelet[2152]: I0412 18:23:03.326355 2152 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:23:03.326908 env[1688]: time="2024-04-12T18:23:03.326846721Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:23:03.327475 kubelet[2152]: I0412 18:23:03.327149 2152 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:23:03.504599 sudo[1947]: pam_unix(sudo:session): session closed for user root Apr 12 18:23:03.503000 audit[1947]: USER_END pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.506697 kernel: kauditd_printk_skb: 477 callbacks suppressed Apr 12 18:23:03.506858 kernel: audit: type=1106 audit(1712946183.503:608): pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.503000 audit[1947]: CRED_DISP pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.523405 kernel: audit: type=1104 audit(1712946183.503:609): pid=1947 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.528168 sshd[1944]: pam_unix(sshd:session): session closed for user core Apr 12 18:23:03.529000 audit[1944]: USER_END pid=1944 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.542215 systemd[1]: sshd@6-172.31.29.129:22-139.178.89.65:48914.service: Deactivated successfully. Apr 12 18:23:03.543495 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:23:03.544945 kernel: audit: type=1106 audit(1712946183.529:610): pid=1944 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.545049 kernel: audit: type=1104 audit(1712946183.529:611): pid=1944 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.529000 audit[1944]: CRED_DISP pid=1944 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:23:03.545496 systemd-logind[1674]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:23:03.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.129:22-139.178.89.65:48914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.555081 systemd-logind[1674]: Removed session 7. Apr 12 18:23:03.562655 kernel: audit: type=1131 audit(1712946183.541:612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.129:22-139.178.89.65:48914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:03.636649 kubelet[2152]: I0412 18:23:03.636609 2152 apiserver.go:52] "Watching apiserver" Apr 12 18:23:03.637503 kubelet[2152]: E0412 18:23:03.637444 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:03.641515 kubelet[2152]: I0412 18:23:03.641478 2152 topology_manager.go:215] "Topology Admit Handler" podUID="9cb92c20-8b25-42d4-8f82-a18df99b0708" podNamespace="kube-system" podName="kube-proxy-7jb9d" Apr 12 18:23:03.642261 kubelet[2152]: I0412 18:23:03.642220 2152 topology_manager.go:215] "Topology Admit Handler" podUID="9945c52b-07dd-4e63-a14b-059fb1d6e62d" podNamespace="calico-system" podName="calico-node-ggfc5" Apr 12 18:23:03.642551 kubelet[2152]: I0412 18:23:03.642525 2152 topology_manager.go:215] "Topology Admit Handler" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" podNamespace="calico-system" podName="csi-node-driver-xf8x8" Apr 12 18:23:03.642935 kubelet[2152]: E0412 18:23:03.642907 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:03.652073 systemd[1]: Created slice kubepods-besteffort-pod9cb92c20_8b25_42d4_8f82_a18df99b0708.slice. Apr 12 18:23:03.658497 kubelet[2152]: I0412 18:23:03.658443 2152 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:23:03.669265 systemd[1]: Created slice kubepods-besteffort-pod9945c52b_07dd_4e63_a14b_059fb1d6e62d.slice. Apr 12 18:23:03.671422 kubelet[2152]: I0412 18:23:03.671367 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-var-lib-calico\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.671572 kubelet[2152]: I0412 18:23:03.671439 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jz77z\" (UniqueName: \"kubernetes.io/projected/88b19468-bc5e-43ba-8826-4eb8be65240f-kube-api-access-jz77z\") pod \"csi-node-driver-xf8x8\" (UID: \"88b19468-bc5e-43ba-8826-4eb8be65240f\") " pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:03.671572 kubelet[2152]: I0412 18:23:03.671487 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9cb92c20-8b25-42d4-8f82-a18df99b0708-lib-modules\") pod \"kube-proxy-7jb9d\" (UID: \"9cb92c20-8b25-42d4-8f82-a18df99b0708\") " pod="kube-system/kube-proxy-7jb9d" Apr 12 18:23:03.671572 kubelet[2152]: I0412 18:23:03.671534 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-flexvol-driver-host\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.671746 kubelet[2152]: I0412 18:23:03.671587 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j42fk\" (UniqueName: \"kubernetes.io/projected/9945c52b-07dd-4e63-a14b-059fb1d6e62d-kube-api-access-j42fk\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.671746 kubelet[2152]: I0412 18:23:03.671630 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/88b19468-bc5e-43ba-8826-4eb8be65240f-varrun\") pod \"csi-node-driver-xf8x8\" (UID: \"88b19468-bc5e-43ba-8826-4eb8be65240f\") " pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:03.671746 kubelet[2152]: I0412 18:23:03.671673 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9945c52b-07dd-4e63-a14b-059fb1d6e62d-node-certs\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.671746 kubelet[2152]: I0412 18:23:03.671714 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9945c52b-07dd-4e63-a14b-059fb1d6e62d-tigera-ca-bundle\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672022 kubelet[2152]: I0412 18:23:03.671782 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-var-run-calico\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672022 kubelet[2152]: I0412 18:23:03.671854 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-cni-bin-dir\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672022 kubelet[2152]: I0412 18:23:03.671904 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-cni-net-dir\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672022 kubelet[2152]: I0412 18:23:03.671948 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/88b19468-bc5e-43ba-8826-4eb8be65240f-registration-dir\") pod \"csi-node-driver-xf8x8\" (UID: \"88b19468-bc5e-43ba-8826-4eb8be65240f\") " pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:03.672022 kubelet[2152]: I0412 18:23:03.671991 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-xtables-lock\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672296 kubelet[2152]: I0412 18:23:03.672043 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9cb92c20-8b25-42d4-8f82-a18df99b0708-xtables-lock\") pod \"kube-proxy-7jb9d\" (UID: \"9cb92c20-8b25-42d4-8f82-a18df99b0708\") " pod="kube-system/kube-proxy-7jb9d" Apr 12 18:23:03.672296 kubelet[2152]: I0412 18:23:03.672100 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rmh7h\" (UniqueName: \"kubernetes.io/projected/9cb92c20-8b25-42d4-8f82-a18df99b0708-kube-api-access-rmh7h\") pod \"kube-proxy-7jb9d\" (UID: \"9cb92c20-8b25-42d4-8f82-a18df99b0708\") " pod="kube-system/kube-proxy-7jb9d" Apr 12 18:23:03.672296 kubelet[2152]: I0412 18:23:03.672144 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-lib-modules\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672296 kubelet[2152]: I0412 18:23:03.672185 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-policysync\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672296 kubelet[2152]: I0412 18:23:03.672233 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9945c52b-07dd-4e63-a14b-059fb1d6e62d-cni-log-dir\") pod \"calico-node-ggfc5\" (UID: \"9945c52b-07dd-4e63-a14b-059fb1d6e62d\") " pod="calico-system/calico-node-ggfc5" Apr 12 18:23:03.672577 kubelet[2152]: I0412 18:23:03.672279 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/88b19468-bc5e-43ba-8826-4eb8be65240f-kubelet-dir\") pod \"csi-node-driver-xf8x8\" (UID: \"88b19468-bc5e-43ba-8826-4eb8be65240f\") " pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:03.672577 kubelet[2152]: I0412 18:23:03.672319 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/88b19468-bc5e-43ba-8826-4eb8be65240f-socket-dir\") pod \"csi-node-driver-xf8x8\" (UID: \"88b19468-bc5e-43ba-8826-4eb8be65240f\") " pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:03.672577 kubelet[2152]: I0412 18:23:03.672364 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9cb92c20-8b25-42d4-8f82-a18df99b0708-kube-proxy\") pod \"kube-proxy-7jb9d\" (UID: \"9cb92c20-8b25-42d4-8f82-a18df99b0708\") " pod="kube-system/kube-proxy-7jb9d" Apr 12 18:23:03.781687 kubelet[2152]: E0412 18:23:03.779898 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.782028 kubelet[2152]: W0412 18:23:03.781963 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.782202 kubelet[2152]: E0412 18:23:03.782180 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.786490 kubelet[2152]: E0412 18:23:03.785812 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.786490 kubelet[2152]: W0412 18:23:03.785866 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.786490 kubelet[2152]: E0412 18:23:03.786038 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.786490 kubelet[2152]: E0412 18:23:03.786282 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.786490 kubelet[2152]: W0412 18:23:03.786298 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.786490 kubelet[2152]: E0412 18:23:03.786432 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.787190 kubelet[2152]: E0412 18:23:03.787169 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.787322 kubelet[2152]: W0412 18:23:03.787298 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.787568 kubelet[2152]: E0412 18:23:03.787549 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.788101 kubelet[2152]: E0412 18:23:03.788081 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.788254 kubelet[2152]: W0412 18:23:03.788230 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.788519 kubelet[2152]: E0412 18:23:03.788498 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.790470 kubelet[2152]: E0412 18:23:03.790442 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.790630 kubelet[2152]: W0412 18:23:03.790603 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.790932 kubelet[2152]: E0412 18:23:03.790895 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.791312 kubelet[2152]: E0412 18:23:03.791289 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.791452 kubelet[2152]: W0412 18:23:03.791427 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.791714 kubelet[2152]: E0412 18:23:03.791694 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.792051 kubelet[2152]: E0412 18:23:03.792031 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.792181 kubelet[2152]: W0412 18:23:03.792155 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.792364 kubelet[2152]: E0412 18:23:03.792331 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.792703 kubelet[2152]: E0412 18:23:03.792683 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.792836 kubelet[2152]: W0412 18:23:03.792796 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.793007 kubelet[2152]: E0412 18:23:03.792975 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.793376 kubelet[2152]: E0412 18:23:03.793355 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.793510 kubelet[2152]: W0412 18:23:03.793488 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.793648 kubelet[2152]: E0412 18:23:03.793627 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.794066 kubelet[2152]: E0412 18:23:03.794038 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.794066 kubelet[2152]: W0412 18:23:03.794064 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.794244 kubelet[2152]: E0412 18:23:03.794103 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.794447 kubelet[2152]: E0412 18:23:03.794421 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.794542 kubelet[2152]: W0412 18:23:03.794446 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.794661 kubelet[2152]: E0412 18:23:03.794638 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.794790 kubelet[2152]: E0412 18:23:03.794730 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.794951 kubelet[2152]: W0412 18:23:03.794927 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.795070 kubelet[2152]: E0412 18:23:03.795050 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.795489 kubelet[2152]: E0412 18:23:03.795469 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.795603 kubelet[2152]: W0412 18:23:03.795581 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.795713 kubelet[2152]: E0412 18:23:03.795693 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.846479 kubelet[2152]: E0412 18:23:03.846446 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.846665 kubelet[2152]: W0412 18:23:03.846636 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.846862 kubelet[2152]: E0412 18:23:03.846813 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.848693 kubelet[2152]: E0412 18:23:03.848651 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.848693 kubelet[2152]: W0412 18:23:03.848683 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.848919 kubelet[2152]: E0412 18:23:03.848718 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.864455 kubelet[2152]: E0412 18:23:03.864422 2152 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:23:03.864700 kubelet[2152]: W0412 18:23:03.864674 2152 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:23:03.864926 kubelet[2152]: E0412 18:23:03.864874 2152 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:23:03.965122 env[1688]: time="2024-04-12T18:23:03.964344049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jb9d,Uid:9cb92c20-8b25-42d4-8f82-a18df99b0708,Namespace:kube-system,Attempt:0,}" Apr 12 18:23:03.983921 env[1688]: time="2024-04-12T18:23:03.983787325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ggfc5,Uid:9945c52b-07dd-4e63-a14b-059fb1d6e62d,Namespace:calico-system,Attempt:0,}" Apr 12 18:23:04.572336 env[1688]: time="2024-04-12T18:23:04.572268156Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.574441 env[1688]: time="2024-04-12T18:23:04.574387512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.581468 env[1688]: time="2024-04-12T18:23:04.581395704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.583380 env[1688]: time="2024-04-12T18:23:04.583327788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.584803 env[1688]: time="2024-04-12T18:23:04.584759664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.588849 env[1688]: time="2024-04-12T18:23:04.588773664Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.590343 env[1688]: time="2024-04-12T18:23:04.590297664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.595940 env[1688]: time="2024-04-12T18:23:04.595889964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:04.632791 env[1688]: time="2024-04-12T18:23:04.632611404Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:04.632791 env[1688]: time="2024-04-12T18:23:04.632685732Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:04.632791 env[1688]: time="2024-04-12T18:23:04.632712432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:04.635279 env[1688]: time="2024-04-12T18:23:04.632990280Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6 pid=2222 runtime=io.containerd.runc.v2 Apr 12 18:23:04.637619 kubelet[2152]: E0412 18:23:04.637550 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:04.654971 env[1688]: time="2024-04-12T18:23:04.654591456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:04.654971 env[1688]: time="2024-04-12T18:23:04.654666120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:04.654971 env[1688]: time="2024-04-12T18:23:04.654691752Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:04.655475 env[1688]: time="2024-04-12T18:23:04.655406520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f07c5addf7e377711babcc147eca7c21cbf3f85c7023573ffae07e8915c4df4 pid=2243 runtime=io.containerd.runc.v2 Apr 12 18:23:04.671340 systemd[1]: Started cri-containerd-3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6.scope. Apr 12 18:23:04.695632 systemd[1]: Started cri-containerd-5f07c5addf7e377711babcc147eca7c21cbf3f85c7023573ffae07e8915c4df4.scope. Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.742287 kernel: audit: type=1400 audit(1712946184.717:613): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.742412 kernel: audit: type=1400 audit(1712946184.717:614): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.742455 kernel: audit: type=1400 audit(1712946184.717:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.745770 kernel: audit: type=1400 audit(1712946184.717:616): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.726000 audit: BPF prog-id=70 op=LOAD Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2222 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363363303138653133666564363066343534386664653230623935 Apr 12 18:23:04.756898 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2222 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363363303138653133666564363066343534386664653230623935 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit: BPF prog-id=71 op=LOAD Apr 12 18:23:04.727000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2222 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363363303138653133666564363066343534386664653230623935 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit: BPF prog-id=72 op=LOAD Apr 12 18:23:04.727000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2222 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363363303138653133666564363066343534386664653230623935 Apr 12 18:23:04.727000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:23:04.727000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.727000 audit: BPF prog-id=73 op=LOAD Apr 12 18:23:04.727000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2222 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363363303138653133666564363066343534386664653230623935 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.756000 audit: BPF prog-id=74 op=LOAD Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303763356164646637653337373731316261626363313437656361 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303763356164646637653337373731316261626363313437656361 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.757000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303763356164646637653337373731316261626363313437656361 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.762000 audit: BPF prog-id=76 op=LOAD Apr 12 18:23:04.762000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303763356164646637653337373731316261626363313437656361 Apr 12 18:23:04.763000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:23:04.763000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:04.763000 audit: BPF prog-id=77 op=LOAD Apr 12 18:23:04.763000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:04.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566303763356164646637653337373731316261626363313437656361 Apr 12 18:23:04.787479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount399470017.mount: Deactivated successfully. Apr 12 18:23:04.806443 env[1688]: time="2024-04-12T18:23:04.806378713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ggfc5,Uid:9945c52b-07dd-4e63-a14b-059fb1d6e62d,Namespace:calico-system,Attempt:0,} returns sandbox id \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\"" Apr 12 18:23:04.810432 env[1688]: time="2024-04-12T18:23:04.810372337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:23:04.817758 env[1688]: time="2024-04-12T18:23:04.817684825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jb9d,Uid:9cb92c20-8b25-42d4-8f82-a18df99b0708,Namespace:kube-system,Attempt:0,} returns sandbox id \"5f07c5addf7e377711babcc147eca7c21cbf3f85c7023573ffae07e8915c4df4\"" Apr 12 18:23:05.638161 kubelet[2152]: E0412 18:23:05.638109 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:05.850628 kubelet[2152]: E0412 18:23:05.850172 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:06.247116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1226764442.mount: Deactivated successfully. Apr 12 18:23:06.392462 env[1688]: time="2024-04-12T18:23:06.392377201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.396189 env[1688]: time="2024-04-12T18:23:06.396115369Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.399613 env[1688]: time="2024-04-12T18:23:06.399551629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.402746 env[1688]: time="2024-04-12T18:23:06.402684781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:06.403566 env[1688]: time="2024-04-12T18:23:06.403520737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:23:06.405943 env[1688]: time="2024-04-12T18:23:06.405883369Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:23:06.409271 env[1688]: time="2024-04-12T18:23:06.409210705Z" level=info msg="CreateContainer within sandbox \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:23:06.443114 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2826266807.mount: Deactivated successfully. Apr 12 18:23:06.449250 env[1688]: time="2024-04-12T18:23:06.449189521Z" level=info msg="CreateContainer within sandbox \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e\"" Apr 12 18:23:06.450981 env[1688]: time="2024-04-12T18:23:06.450929725Z" level=info msg="StartContainer for \"46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e\"" Apr 12 18:23:06.490529 systemd[1]: Started cri-containerd-46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e.scope. Apr 12 18:23:06.529000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.529000 audit[2305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2222 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653061383561336336323033353933333839376431393463323332 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.530000 audit: BPF prog-id=78 op=LOAD Apr 12 18:23:06.530000 audit[2305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2222 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653061383561336336323033353933333839376431393463323332 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.532000 audit: BPF prog-id=79 op=LOAD Apr 12 18:23:06.532000 audit[2305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2222 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653061383561336336323033353933333839376431393463323332 Apr 12 18:23:06.533000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:23:06.533000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:06.533000 audit: BPF prog-id=80 op=LOAD Apr 12 18:23:06.533000 audit[2305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2222 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:06.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653061383561336336323033353933333839376431393463323332 Apr 12 18:23:06.565741 env[1688]: time="2024-04-12T18:23:06.565651826Z" level=info msg="StartContainer for \"46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e\" returns successfully" Apr 12 18:23:06.576963 systemd[1]: cri-containerd-46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e.scope: Deactivated successfully. Apr 12 18:23:06.579000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:23:06.638986 kubelet[2152]: E0412 18:23:06.638901 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:06.702364 env[1688]: time="2024-04-12T18:23:06.702075614Z" level=info msg="shim disconnected" id=46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e Apr 12 18:23:06.702691 env[1688]: time="2024-04-12T18:23:06.702652898Z" level=warning msg="cleaning up after shim disconnected" id=46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e namespace=k8s.io Apr 12 18:23:06.702871 env[1688]: time="2024-04-12T18:23:06.702806822Z" level=info msg="cleaning up dead shim" Apr 12 18:23:06.718799 env[1688]: time="2024-04-12T18:23:06.718733438Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:23:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2343 runtime=io.containerd.runc.v2\n" Apr 12 18:23:07.071013 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-46e0a85a3c62035933897d194c232797b92ee42da6cad3fec0aa4cf7797dc77e-rootfs.mount: Deactivated successfully. Apr 12 18:23:07.639914 kubelet[2152]: E0412 18:23:07.639864 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:07.850103 kubelet[2152]: E0412 18:23:07.850054 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:07.894983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1069568447.mount: Deactivated successfully. Apr 12 18:23:08.640761 kubelet[2152]: E0412 18:23:08.640691 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:08.694576 env[1688]: time="2024-04-12T18:23:08.694517968Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:08.697314 env[1688]: time="2024-04-12T18:23:08.697267096Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:08.702687 env[1688]: time="2024-04-12T18:23:08.702625768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:08.705148 env[1688]: time="2024-04-12T18:23:08.705081016Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:08.708809 env[1688]: time="2024-04-12T18:23:08.708739540Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 18:23:08.712935 env[1688]: time="2024-04-12T18:23:08.712868308Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:23:08.713901 env[1688]: time="2024-04-12T18:23:08.713853052Z" level=info msg="CreateContainer within sandbox \"5f07c5addf7e377711babcc147eca7c21cbf3f85c7023573ffae07e8915c4df4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:23:08.735182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3014580431.mount: Deactivated successfully. Apr 12 18:23:08.745884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount609408100.mount: Deactivated successfully. Apr 12 18:23:08.755470 env[1688]: time="2024-04-12T18:23:08.755383696Z" level=info msg="CreateContainer within sandbox \"5f07c5addf7e377711babcc147eca7c21cbf3f85c7023573ffae07e8915c4df4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"94ea124e697cb6d8384f9e31e1f6908923f4e20b35ea51eb9cd18de04cdee38c\"" Apr 12 18:23:08.756338 env[1688]: time="2024-04-12T18:23:08.756276832Z" level=info msg="StartContainer for \"94ea124e697cb6d8384f9e31e1f6908923f4e20b35ea51eb9cd18de04cdee38c\"" Apr 12 18:23:08.798679 systemd[1]: Started cri-containerd-94ea124e697cb6d8384f9e31e1f6908923f4e20b35ea51eb9cd18de04cdee38c.scope. Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.838115 kernel: kauditd_printk_skb: 159 callbacks suppressed Apr 12 18:23:08.838211 kernel: audit: type=1400 audit(1712946188.835:655): avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2243 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:08.856783 kernel: audit: type=1300 audit(1712946188.835:655): arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2243 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:08.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934656131323465363937636236643833383466396533316531663639 Apr 12 18:23:08.867103 kernel: audit: type=1327 audit(1712946188.835:655): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934656131323465363937636236643833383466396533316531663639 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.875195 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.875329 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.890849 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.900333 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.908304 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.916272 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.922366 env[1688]: time="2024-04-12T18:23:08.922312469Z" level=info msg="StartContainer for \"94ea124e697cb6d8384f9e31e1f6908923f4e20b35ea51eb9cd18de04cdee38c\" returns successfully" Apr 12 18:23:08.929731 kernel: audit: type=1400 audit(1712946188.835:656): avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.835000 audit: BPF prog-id=81 op=LOAD Apr 12 18:23:08.835000 audit[2371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2243 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:08.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934656131323465363937636236643833383466396533316531663639 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.837000 audit: BPF prog-id=82 op=LOAD Apr 12 18:23:08.837000 audit[2371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2243 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934656131323465363937636236643833383466396533316531663639 Apr 12 18:23:08.844000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:23:08.844000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { perfmon } for pid=2371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit[2371]: AVC avc: denied { bpf } for pid=2371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:08.844000 audit: BPF prog-id=83 op=LOAD Apr 12 18:23:08.844000 audit[2371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2243 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:08.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934656131323465363937636236643833383466396533316531663639 Apr 12 18:23:09.037000 audit[2423]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.037000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe533d020 a2=0 a3=1 items=0 ppid=2382 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:23:09.039000 audit[2424]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.039000 audit[2424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbb9e490 a2=0 a3=1 items=0 ppid=2382 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:23:09.041000 audit[2425]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.041000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefe7fea0 a2=0 a3=1 items=0 ppid=2382 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:23:09.041000 audit[2426]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.041000 audit[2426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff18d9d50 a2=0 a3=1 items=0 ppid=2382 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:23:09.044000 audit[2428]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.044000 audit[2428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3395c60 a2=0 a3=1 items=0 ppid=2382 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:23:09.046000 audit[2427]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.046000 audit[2427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcccca3d0 a2=0 a3=1 items=0 ppid=2382 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:23:09.150000 audit[2429]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.150000 audit[2429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffbd1c230 a2=0 a3=1 items=0 ppid=2382 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:23:09.156000 audit[2431]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.156000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffebcae1e0 a2=0 a3=1 items=0 ppid=2382 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:23:09.163000 audit[2434]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.163000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd81a2660 a2=0 a3=1 items=0 ppid=2382 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:23:09.165000 audit[2435]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.165000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd57e17d0 a2=0 a3=1 items=0 ppid=2382 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:23:09.171000 audit[2437]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.171000 audit[2437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd691220 a2=0 a3=1 items=0 ppid=2382 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:23:09.174000 audit[2438]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.174000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc0d5630 a2=0 a3=1 items=0 ppid=2382 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:23:09.181000 audit[2440]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.181000 audit[2440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe23171d0 a2=0 a3=1 items=0 ppid=2382 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:23:09.189000 audit[2443]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.189000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffaaa80f0 a2=0 a3=1 items=0 ppid=2382 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:23:09.191000 audit[2444]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.191000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc029ab00 a2=0 a3=1 items=0 ppid=2382 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:23:09.199000 audit[2446]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.199000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff8774930 a2=0 a3=1 items=0 ppid=2382 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:23:09.202000 audit[2447]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.202000 audit[2447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6adc6b0 a2=0 a3=1 items=0 ppid=2382 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:23:09.207000 audit[2449]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.207000 audit[2449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6691bb0 a2=0 a3=1 items=0 ppid=2382 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:23:09.214000 audit[2452]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.214000 audit[2452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7eea670 a2=0 a3=1 items=0 ppid=2382 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:23:09.221000 audit[2455]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.221000 audit[2455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff67dbb10 a2=0 a3=1 items=0 ppid=2382 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:23:09.224000 audit[2456]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.224000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd2d99e90 a2=0 a3=1 items=0 ppid=2382 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:23:09.229000 audit[2458]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.229000 audit[2458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffc17f290 a2=0 a3=1 items=0 ppid=2382 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:09.268000 audit[2463]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.268000 audit[2463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd01e1df0 a2=0 a3=1 items=0 ppid=2382 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:09.271000 audit[2464]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.271000 audit[2464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd15f35d0 a2=0 a3=1 items=0 ppid=2382 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:23:09.276000 audit[2466]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:23:09.276000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc542b640 a2=0 a3=1 items=0 ppid=2382 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:23:09.298000 audit[2472]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:09.298000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd8578c50 a2=0 a3=1 items=0 ppid=2382 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:09.332000 audit[2472]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:09.332000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=ffffd8578c50 a2=0 a3=1 items=0 ppid=2382 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:09.352000 audit[2480]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.352000 audit[2480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe9875160 a2=0 a3=1 items=0 ppid=2382 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:23:09.359000 audit[2482]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.359000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcbbbff70 a2=0 a3=1 items=0 ppid=2382 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:23:09.368000 audit[2485]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.368000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff3c1b800 a2=0 a3=1 items=0 ppid=2382 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:23:09.370000 audit[2486]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.370000 audit[2486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9e4a050 a2=0 a3=1 items=0 ppid=2382 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:23:09.375000 audit[2488]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.375000 audit[2488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd39f3560 a2=0 a3=1 items=0 ppid=2382 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:23:09.377000 audit[2489]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.377000 audit[2489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbdb15a0 a2=0 a3=1 items=0 ppid=2382 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:23:09.383000 audit[2491]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.383000 audit[2491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa7945b0 a2=0 a3=1 items=0 ppid=2382 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:23:09.391000 audit[2494]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.391000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe5ee0b00 a2=0 a3=1 items=0 ppid=2382 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:23:09.394000 audit[2495]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.394000 audit[2495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe17b6750 a2=0 a3=1 items=0 ppid=2382 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:23:09.399000 audit[2497]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.399000 audit[2497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6ee1e20 a2=0 a3=1 items=0 ppid=2382 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:23:09.402000 audit[2498]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.402000 audit[2498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5796dd0 a2=0 a3=1 items=0 ppid=2382 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:23:09.409000 audit[2500]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.409000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff436e310 a2=0 a3=1 items=0 ppid=2382 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:23:09.416000 audit[2503]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.416000 audit[2503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc052c630 a2=0 a3=1 items=0 ppid=2382 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:23:09.425000 audit[2506]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.425000 audit[2506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffddba6c90 a2=0 a3=1 items=0 ppid=2382 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:23:09.428000 audit[2507]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2507 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.428000 audit[2507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc6089d70 a2=0 a3=1 items=0 ppid=2382 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:23:09.432000 audit[2509]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.432000 audit[2509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd738e580 a2=0 a3=1 items=0 ppid=2382 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:09.439000 audit[2512]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2512 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.439000 audit[2512]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe3e03df0 a2=0 a3=1 items=0 ppid=2382 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:23:09.441000 audit[2513]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2513 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.441000 audit[2513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0d5b420 a2=0 a3=1 items=0 ppid=2382 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:23:09.446000 audit[2515]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.446000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe05a9450 a2=0 a3=1 items=0 ppid=2382 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:23:09.448000 audit[2516]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2516 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.448000 audit[2516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc6a5000 a2=0 a3=1 items=0 ppid=2382 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:23:09.453000 audit[2518]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2518 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.453000 audit[2518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcbf084d0 a2=0 a3=1 items=0 ppid=2382 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:23:09.459000 audit[2521]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:23:09.459000 audit[2521]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec498b40 a2=0 a3=1 items=0 ppid=2382 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:23:09.465000 audit[2523]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:23:09.465000 audit[2523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffdee6bd80 a2=0 a3=1 items=0 ppid=2382 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.465000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:09.466000 audit[2523]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2523 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:23:09.466000 audit[2523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdee6bd80 a2=0 a3=1 items=0 ppid=2382 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:09.466000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:09.641394 kubelet[2152]: E0412 18:23:09.641343 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:09.834142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1702872333.mount: Deactivated successfully. Apr 12 18:23:09.850927 kubelet[2152]: E0412 18:23:09.850239 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:10.641834 kubelet[2152]: E0412 18:23:10.641760 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:11.642891 kubelet[2152]: E0412 18:23:11.642794 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:11.852232 kubelet[2152]: E0412 18:23:11.852190 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:12.643337 kubelet[2152]: E0412 18:23:12.643195 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:13.244072 env[1688]: time="2024-04-12T18:23:13.244006207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.247704 env[1688]: time="2024-04-12T18:23:13.247628347Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.249874 env[1688]: time="2024-04-12T18:23:13.249804511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.252688 env[1688]: time="2024-04-12T18:23:13.252625927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:13.253956 env[1688]: time="2024-04-12T18:23:13.253885339Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:23:13.257814 env[1688]: time="2024-04-12T18:23:13.257737423Z" level=info msg="CreateContainer within sandbox \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:23:13.277167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2604084177.mount: Deactivated successfully. Apr 12 18:23:13.288544 env[1688]: time="2024-04-12T18:23:13.288465355Z" level=info msg="CreateContainer within sandbox \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9\"" Apr 12 18:23:13.289450 env[1688]: time="2024-04-12T18:23:13.289375711Z" level=info msg="StartContainer for \"0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9\"" Apr 12 18:23:13.326549 systemd[1]: Started cri-containerd-0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9.scope. Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2222 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063363732653934663039626431363330366432366238656564323032 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.371000 audit: BPF prog-id=84 op=LOAD Apr 12 18:23:13.371000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2222 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063363732653934663039626431363330366432366238656564323032 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit: BPF prog-id=85 op=LOAD Apr 12 18:23:13.372000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2222 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063363732653934663039626431363330366432366238656564323032 Apr 12 18:23:13.372000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:23:13.372000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:13.372000 audit: BPF prog-id=86 op=LOAD Apr 12 18:23:13.372000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2222 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:13.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063363732653934663039626431363330366432366238656564323032 Apr 12 18:23:13.409666 env[1688]: time="2024-04-12T18:23:13.409586888Z" level=info msg="StartContainer for \"0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9\" returns successfully" Apr 12 18:23:13.644997 kubelet[2152]: E0412 18:23:13.643990 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:13.853181 kubelet[2152]: E0412 18:23:13.853134 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:13.919317 kubelet[2152]: I0412 18:23:13.919272 2152 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7jb9d" podStartSLOduration=7.029017455 podCreationTimestamp="2024-04-12 18:23:03 +0000 UTC" firstStartedPulling="2024-04-12 18:23:04.820092481 +0000 UTC m=+4.338896579" lastFinishedPulling="2024-04-12 18:23:08.710288884 +0000 UTC m=+8.229092982" observedRunningTime="2024-04-12 18:23:09.896273106 +0000 UTC m=+9.415077240" watchObservedRunningTime="2024-04-12 18:23:13.919213858 +0000 UTC m=+13.438017992" Apr 12 18:23:14.498017 env[1688]: time="2024-04-12T18:23:14.497945625Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:23:14.502716 systemd[1]: cri-containerd-0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9.scope: Deactivated successfully. Apr 12 18:23:14.506000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:23:14.509083 kernel: kauditd_printk_skb: 229 callbacks suppressed Apr 12 18:23:14.509237 kernel: audit: type=1334 audit(1712946194.506:718): prog-id=86 op=UNLOAD Apr 12 18:23:14.523244 kubelet[2152]: I0412 18:23:14.522021 2152 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:23:14.541003 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9-rootfs.mount: Deactivated successfully. Apr 12 18:23:14.645257 kubelet[2152]: E0412 18:23:14.645194 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:15.645971 kubelet[2152]: E0412 18:23:15.645901 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:15.684754 env[1688]: time="2024-04-12T18:23:15.684673679Z" level=info msg="shim disconnected" id=0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9 Apr 12 18:23:15.684754 env[1688]: time="2024-04-12T18:23:15.684747335Z" level=warning msg="cleaning up after shim disconnected" id=0c672e94f09bd16306d26b8eed2029877328385f680a0c6e6b24c1ad3d266eb9 namespace=k8s.io Apr 12 18:23:15.685481 env[1688]: time="2024-04-12T18:23:15.684771911Z" level=info msg="cleaning up dead shim" Apr 12 18:23:15.697948 env[1688]: time="2024-04-12T18:23:15.697892279Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:23:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2572 runtime=io.containerd.runc.v2\n" Apr 12 18:23:15.859989 systemd[1]: Created slice kubepods-besteffort-pod88b19468_bc5e_43ba_8826_4eb8be65240f.slice. Apr 12 18:23:15.865366 env[1688]: time="2024-04-12T18:23:15.865288608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xf8x8,Uid:88b19468-bc5e-43ba-8826-4eb8be65240f,Namespace:calico-system,Attempt:0,}" Apr 12 18:23:15.912587 env[1688]: time="2024-04-12T18:23:15.912515760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:23:15.998093 env[1688]: time="2024-04-12T18:23:15.997996008Z" level=error msg="Failed to destroy network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.002872 env[1688]: time="2024-04-12T18:23:16.001179392Z" level=error msg="encountered an error cleaning up failed sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.002872 env[1688]: time="2024-04-12T18:23:16.001284032Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xf8x8,Uid:88b19468-bc5e-43ba-8826-4eb8be65240f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.003095 kubelet[2152]: E0412 18:23:16.001608 2152 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.003095 kubelet[2152]: E0412 18:23:16.001684 2152 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:16.003095 kubelet[2152]: E0412 18:23:16.001736 2152 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xf8x8" Apr 12 18:23:16.002981 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1-shm.mount: Deactivated successfully. Apr 12 18:23:16.003425 kubelet[2152]: E0412 18:23:16.001845 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xf8x8_calico-system(88b19468-bc5e-43ba-8826-4eb8be65240f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xf8x8_calico-system(88b19468-bc5e-43ba-8826-4eb8be65240f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:16.187289 kubelet[2152]: I0412 18:23:16.186209 2152 topology_manager.go:215] "Topology Admit Handler" podUID="575bc052-131d-478c-959f-09c130d224fe" podNamespace="default" podName="nginx-deployment-6d5f899847-w6zt7" Apr 12 18:23:16.196505 systemd[1]: Created slice kubepods-besteffort-pod575bc052_131d_478c_959f_09c130d224fe.slice. Apr 12 18:23:16.262222 kubelet[2152]: I0412 18:23:16.262182 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sqhf5\" (UniqueName: \"kubernetes.io/projected/575bc052-131d-478c-959f-09c130d224fe-kube-api-access-sqhf5\") pod \"nginx-deployment-6d5f899847-w6zt7\" (UID: \"575bc052-131d-478c-959f-09c130d224fe\") " pod="default/nginx-deployment-6d5f899847-w6zt7" Apr 12 18:23:16.503340 env[1688]: time="2024-04-12T18:23:16.503208839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w6zt7,Uid:575bc052-131d-478c-959f-09c130d224fe,Namespace:default,Attempt:0,}" Apr 12 18:23:16.628197 env[1688]: time="2024-04-12T18:23:16.628107300Z" level=error msg="Failed to destroy network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.629100 env[1688]: time="2024-04-12T18:23:16.628993464Z" level=error msg="encountered an error cleaning up failed sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.629248 env[1688]: time="2024-04-12T18:23:16.629118132Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w6zt7,Uid:575bc052-131d-478c-959f-09c130d224fe,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.630083 kubelet[2152]: E0412 18:23:16.629521 2152 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.630083 kubelet[2152]: E0412 18:23:16.629597 2152 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-w6zt7" Apr 12 18:23:16.630083 kubelet[2152]: E0412 18:23:16.629637 2152 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-w6zt7" Apr 12 18:23:16.630418 kubelet[2152]: E0412 18:23:16.629765 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-w6zt7_default(575bc052-131d-478c-959f-09c130d224fe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-w6zt7_default(575bc052-131d-478c-959f-09c130d224fe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-w6zt7" podUID="575bc052-131d-478c-959f-09c130d224fe" Apr 12 18:23:16.646807 kubelet[2152]: E0412 18:23:16.646745 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:16.882434 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084-shm.mount: Deactivated successfully. Apr 12 18:23:16.914391 kubelet[2152]: I0412 18:23:16.914338 2152 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:23:16.915578 env[1688]: time="2024-04-12T18:23:16.915524629Z" level=info msg="StopPodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\"" Apr 12 18:23:16.918188 kubelet[2152]: I0412 18:23:16.918132 2152 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:23:16.921696 env[1688]: time="2024-04-12T18:23:16.921611941Z" level=info msg="StopPodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\"" Apr 12 18:23:16.980336 env[1688]: time="2024-04-12T18:23:16.980193769Z" level=error msg="StopPodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" failed" error="failed to destroy network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:16.980972 kubelet[2152]: E0412 18:23:16.980903 2152 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:23:16.981091 kubelet[2152]: E0412 18:23:16.981058 2152 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084"} Apr 12 18:23:16.981198 kubelet[2152]: E0412 18:23:16.981153 2152 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"575bc052-131d-478c-959f-09c130d224fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:23:16.981330 kubelet[2152]: E0412 18:23:16.981230 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"575bc052-131d-478c-959f-09c130d224fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-w6zt7" podUID="575bc052-131d-478c-959f-09c130d224fe" Apr 12 18:23:17.024699 env[1688]: time="2024-04-12T18:23:17.024620398Z" level=error msg="StopPodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" failed" error="failed to destroy network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:23:17.025326 kubelet[2152]: E0412 18:23:17.025248 2152 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:23:17.025460 kubelet[2152]: E0412 18:23:17.025363 2152 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1"} Apr 12 18:23:17.025535 kubelet[2152]: E0412 18:23:17.025450 2152 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88b19468-bc5e-43ba-8826-4eb8be65240f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:23:17.026105 kubelet[2152]: E0412 18:23:17.025546 2152 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88b19468-bc5e-43ba-8826-4eb8be65240f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xf8x8" podUID="88b19468-bc5e-43ba-8826-4eb8be65240f" Apr 12 18:23:17.647560 kubelet[2152]: E0412 18:23:17.647466 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:17.651230 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:23:17.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:17.660947 kernel: audit: type=1131 audit(1712946197.650:719): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:23:17.673000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:23:17.673000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:23:17.679316 kernel: audit: type=1334 audit(1712946197.673:720): prog-id=55 op=UNLOAD Apr 12 18:23:17.679393 kernel: audit: type=1334 audit(1712946197.673:721): prog-id=54 op=UNLOAD Apr 12 18:23:17.679448 kernel: audit: type=1334 audit(1712946197.673:722): prog-id=53 op=UNLOAD Apr 12 18:23:17.673000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:23:18.648188 kubelet[2152]: E0412 18:23:18.648120 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:19.648347 kubelet[2152]: E0412 18:23:19.648288 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:20.649417 kubelet[2152]: E0412 18:23:20.649344 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:21.635302 kubelet[2152]: E0412 18:23:21.635244 2152 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:21.649979 kubelet[2152]: E0412 18:23:21.649926 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:22.650956 kubelet[2152]: E0412 18:23:22.650892 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:23.651592 kubelet[2152]: E0412 18:23:23.651525 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:24.023175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3878046996.mount: Deactivated successfully. Apr 12 18:23:24.074492 amazon-ssm-agent[1705]: 2024-04-12 18:23:24 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Apr 12 18:23:24.135516 env[1688]: time="2024-04-12T18:23:24.135456139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:24.138638 env[1688]: time="2024-04-12T18:23:24.138588573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:24.141216 env[1688]: time="2024-04-12T18:23:24.141152338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:24.144034 env[1688]: time="2024-04-12T18:23:24.143986415Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:24.147023 env[1688]: time="2024-04-12T18:23:24.146945736Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:23:24.180446 env[1688]: time="2024-04-12T18:23:24.180389510Z" level=info msg="CreateContainer within sandbox \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:23:24.208948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4266366295.mount: Deactivated successfully. Apr 12 18:23:24.215176 env[1688]: time="2024-04-12T18:23:24.215068660Z" level=info msg="CreateContainer within sandbox \"3263c018e13fed60f4548fde20b955c1e0f44ad7848237433e807c92366583d6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd\"" Apr 12 18:23:24.216358 env[1688]: time="2024-04-12T18:23:24.216237376Z" level=info msg="StartContainer for \"ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd\"" Apr 12 18:23:24.247205 systemd[1]: Started cri-containerd-ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd.scope. Apr 12 18:23:24.308136 kernel: audit: type=1400 audit(1712946204.288:723): avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.308277 kernel: audit: type=1300 audit(1712946204.288:723): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2222 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2222 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:24.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303662656634363430646265373432393665633162313835613562 Apr 12 18:23:24.320343 kernel: audit: type=1327 audit(1712946204.288:723): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303662656634363430646265373432393665633162313835613562 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.329515 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.347149 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.347264 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.355398 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.366307 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.374722 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.383165 kernel: audit: type=1400 audit(1712946204.288:724): avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.383577 env[1688]: time="2024-04-12T18:23:24.383483532Z" level=info msg="StartContainer for \"ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd\" returns successfully" Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.288000 audit: BPF prog-id=87 op=LOAD Apr 12 18:23:24.288000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2222 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:24.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303662656634363430646265373432393665633162313835613562 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.296000 audit: BPF prog-id=88 op=LOAD Apr 12 18:23:24.296000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2222 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:24.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303662656634363430646265373432393665633162313835613562 Apr 12 18:23:24.307000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:23:24.307000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:24.307000 audit: BPF prog-id=89 op=LOAD Apr 12 18:23:24.307000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2222 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:24.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303662656634363430646265373432393665633162313835613562 Apr 12 18:23:24.493479 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:23:24.493641 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:23:24.652882 kubelet[2152]: E0412 18:23:24.651871 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:25.653017 kubelet[2152]: E0412 18:23:25.652955 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:25.980899 systemd[1]: run-containerd-runc-k8s.io-ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd-runc.yp4h7A.mount: Deactivated successfully. Apr 12 18:23:25.983000 audit[2830]: AVC avc: denied { write } for pid=2830 comm="tee" name="fd" dev="proc" ino=15713 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:25.991000 audit[2822]: AVC avc: denied { write } for pid=2822 comm="tee" name="fd" dev="proc" ino=15048 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:25.991000 audit[2822]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc96c598a a2=241 a3=1b6 items=1 ppid=2790 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:25.991000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:23:25.991000 audit: PATH item=0 name="/dev/fd/63" inode=15025 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:25.991000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:26.016000 audit[2848]: AVC avc: denied { write } for pid=2848 comm="tee" name="fd" dev="proc" ino=15059 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:26.016000 audit[2848]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedca2988 a2=241 a3=1b6 items=1 ppid=2787 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.016000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:23:26.016000 audit: PATH item=0 name="/dev/fd/63" inode=15045 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:26.016000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:25.983000 audit[2830]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0abc979 a2=241 a3=1b6 items=1 ppid=2796 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:25.983000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:23:25.983000 audit: PATH item=0 name="/dev/fd/63" inode=15031 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:25.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:26.023000 audit[2853]: AVC avc: denied { write } for pid=2853 comm="tee" name="fd" dev="proc" ino=15065 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:26.023000 audit[2853]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf47f989 a2=241 a3=1b6 items=1 ppid=2789 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.023000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:23:26.023000 audit: PATH item=0 name="/dev/fd/63" inode=15056 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:26.023000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:26.028000 audit[2857]: AVC avc: denied { write } for pid=2857 comm="tee" name="fd" dev="proc" ino=15067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:26.028000 audit[2857]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd9193988 a2=241 a3=1b6 items=1 ppid=2791 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.028000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:23:26.028000 audit: PATH item=0 name="/dev/fd/63" inode=15717 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:26.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:26.036000 audit[2855]: AVC avc: denied { write } for pid=2855 comm="tee" name="fd" dev="proc" ino=15732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:26.036000 audit[2855]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffececa988 a2=241 a3=1b6 items=1 ppid=2795 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.036000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:23:26.036000 audit: PATH item=0 name="/dev/fd/63" inode=15716 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:26.036000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:26.049000 audit[2873]: AVC avc: denied { write } for pid=2873 comm="tee" name="fd" dev="proc" ino=15736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:23:26.049000 audit[2873]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcc6ec978 a2=241 a3=1b6 items=1 ppid=2798 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.049000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:23:26.049000 audit: PATH item=0 name="/dev/fd/63" inode=15069 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:23:26.049000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:23:26.409426 kernel: Initializing XFRM netlink socket Apr 12 18:23:26.653952 kubelet[2152]: E0412 18:23:26.653832 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:26.735020 (udev-worker)[2732]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:26.736791 (udev-worker)[2944]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit: BPF prog-id=90 op=LOAD Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6497608 a2=70 a3=ffffc6497678 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.737000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit: BPF prog-id=91 op=LOAD Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6497608 a2=70 a3=4b243c items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.737000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc64975c0 a2=70 a3=ffffc6497630 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit: BPF prog-id=92 op=LOAD Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc64975a8 a2=70 a3=ffffc6497618 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.737000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6497678 a2=70 a3=0 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6497668 a2=70 a3=0 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.737000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.737000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc64975d8 a2=70 a3=0 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc64976b0 a2=70 a3=291b798f items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.739000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc64976b0 a2=70 a3=291b798f items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.739000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.739000 audit: BPF prog-id=93 op=LOAD Apr 12 18:23:26.739000 audit[2945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc64975d8 a2=70 a3=291b79a9 items=0 ppid=2804 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.739000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:23:26.744000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.744000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff1532a18 a2=70 a3=fffff1532a88 items=0 ppid=2804 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:23:26.744000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:26.744000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff15328e8 a2=70 a3=fffff1532958 items=0 ppid=2804 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:23:26.767000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:23:26.852000 audit[2972]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:26.852000 audit[2972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe8b99350 a2=0 a3=ffffa4c04fa8 items=0 ppid=2804 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.852000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:26.863000 audit[2971]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:26.863000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd6cab350 a2=0 a3=ffff8fa43fa8 items=0 ppid=2804 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.863000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:26.863000 audit[2970]: NETFILTER_CFG table=raw:67 family=2 entries=19 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:26.863000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd6355830 a2=0 a3=ffff9c2c1fa8 items=0 ppid=2804 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.863000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:26.872000 audit[2973]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:26.872000 audit[2973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffed699b10 a2=0 a3=ffff9ad58fa8 items=0 ppid=2804 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:26.872000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:27.427885 systemd-networkd[1492]: vxlan.calico: Link UP Apr 12 18:23:27.427906 systemd-networkd[1492]: vxlan.calico: Gained carrier Apr 12 18:23:27.655033 kubelet[2152]: E0412 18:23:27.654969 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:28.656088 kubelet[2152]: E0412 18:23:28.656016 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:29.048978 systemd-networkd[1492]: vxlan.calico: Gained IPv6LL Apr 12 18:23:29.657053 kubelet[2152]: E0412 18:23:29.656991 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:30.657575 kubelet[2152]: E0412 18:23:30.657533 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:30.850575 env[1688]: time="2024-04-12T18:23:30.850514605Z" level=info msg="StopPodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\"" Apr 12 18:23:30.933693 kubelet[2152]: I0412 18:23:30.932974 2152 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-ggfc5" podStartSLOduration=8.590564431 podCreationTimestamp="2024-04-12 18:23:03 +0000 UTC" firstStartedPulling="2024-04-12 18:23:04.809003461 +0000 UTC m=+4.327807559" lastFinishedPulling="2024-04-12 18:23:24.151328666 +0000 UTC m=+23.670132764" observedRunningTime="2024-04-12 18:23:24.959992505 +0000 UTC m=+24.478796603" watchObservedRunningTime="2024-04-12 18:23:30.932889636 +0000 UTC m=+30.451693746" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.935 [INFO][3000] k8s.go 585: Cleaning up netns ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.936 [INFO][3000] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" iface="eth0" netns="/var/run/netns/cni-66c20357-ac8d-2792-35db-005d7edfd93f" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.936 [INFO][3000] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" iface="eth0" netns="/var/run/netns/cni-66c20357-ac8d-2792-35db-005d7edfd93f" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.936 [INFO][3000] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" iface="eth0" netns="/var/run/netns/cni-66c20357-ac8d-2792-35db-005d7edfd93f" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.936 [INFO][3000] k8s.go 592: Releasing IP address(es) ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.937 [INFO][3000] utils.go 188: Calico CNI releasing IP address ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.980 [INFO][3006] ipam_plugin.go 415: Releasing address using handleID ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.980 [INFO][3006] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.980 [INFO][3006] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.994 [WARNING][3006] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.994 [INFO][3006] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:30.997 [INFO][3006] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:31.002588 env[1688]: 2024-04-12 18:23:31.000 [INFO][3000] k8s.go 598: Teardown processing complete. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:23:31.006335 systemd[1]: run-netns-cni\x2d66c20357\x2dac8d\x2d2792\x2d35db\x2d005d7edfd93f.mount: Deactivated successfully. Apr 12 18:23:31.007947 env[1688]: time="2024-04-12T18:23:31.007783816Z" level=info msg="TearDown network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" successfully" Apr 12 18:23:31.008117 env[1688]: time="2024-04-12T18:23:31.008080564Z" level=info msg="StopPodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" returns successfully" Apr 12 18:23:31.009591 env[1688]: time="2024-04-12T18:23:31.009527081Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xf8x8,Uid:88b19468-bc5e-43ba-8826-4eb8be65240f,Namespace:calico-system,Attempt:1,}" Apr 12 18:23:31.227995 systemd-networkd[1492]: calia86a62e53cf: Link UP Apr 12 18:23:31.232876 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:23:31.233012 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia86a62e53cf: link becomes ready Apr 12 18:23:31.236035 systemd-networkd[1492]: calia86a62e53cf: Gained carrier Apr 12 18:23:31.238251 (udev-worker)[3031]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.098 [INFO][3013] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.129-k8s-csi--node--driver--xf8x8-eth0 csi-node-driver- calico-system 88b19468-bc5e-43ba-8826-4eb8be65240f 947 0 2024-04-12 18:23:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.129 csi-node-driver-xf8x8 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia86a62e53cf [] []}} ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.099 [INFO][3013] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.149 [INFO][3025] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" HandleID="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.170 [INFO][3025] ipam_plugin.go 268: Auto assigning IP ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" HandleID="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002eff10), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.29.129", "pod":"csi-node-driver-xf8x8", "timestamp":"2024-04-12 18:23:31.149126129 +0000 UTC"}, Hostname:"172.31.29.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.170 [INFO][3025] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.170 [INFO][3025] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.170 [INFO][3025] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.129' Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.174 [INFO][3025] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.181 [INFO][3025] ipam.go 372: Looking up existing affinities for host host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.189 [INFO][3025] ipam.go 489: Trying affinity for 192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.193 [INFO][3025] ipam.go 155: Attempting to load block cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.198 [INFO][3025] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.198 [INFO][3025] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.0/26 handle="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.201 [INFO][3025] ipam.go 1682: Creating new handle: k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2 Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.208 [INFO][3025] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.0/26 handle="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.216 [INFO][3025] ipam.go 1216: Successfully claimed IPs: [192.168.70.1/26] block=192.168.70.0/26 handle="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.217 [INFO][3025] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.1/26] handle="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" host="172.31.29.129" Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.217 [INFO][3025] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:31.265932 env[1688]: 2024-04-12 18:23:31.217 [INFO][3025] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.1/26] IPv6=[] ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" HandleID="k8s-pod-network.63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.267232 env[1688]: 2024-04-12 18:23:31.223 [INFO][3013] k8s.go 385: Populated endpoint ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-csi--node--driver--xf8x8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88b19468-bc5e-43ba-8826-4eb8be65240f", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"", Pod:"csi-node-driver-xf8x8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia86a62e53cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:31.267232 env[1688]: 2024-04-12 18:23:31.223 [INFO][3013] k8s.go 386: Calico CNI using IPs: [192.168.70.1/32] ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.267232 env[1688]: 2024-04-12 18:23:31.223 [INFO][3013] dataplane_linux.go 68: Setting the host side veth name to calia86a62e53cf ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.267232 env[1688]: 2024-04-12 18:23:31.236 [INFO][3013] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.267232 env[1688]: 2024-04-12 18:23:31.237 [INFO][3013] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-csi--node--driver--xf8x8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88b19468-bc5e-43ba-8826-4eb8be65240f", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2", Pod:"csi-node-driver-xf8x8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia86a62e53cf", MAC:"ba:53:4b:0b:53:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:31.267232 env[1688]: 2024-04-12 18:23:31.262 [INFO][3013] k8s.go 498: Wrote updated endpoint to datastore ContainerID="63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2" Namespace="calico-system" Pod="csi-node-driver-xf8x8" WorkloadEndpoint="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:23:31.296645 env[1688]: time="2024-04-12T18:23:31.296526823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:31.297021 env[1688]: time="2024-04-12T18:23:31.296936827Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:31.297239 env[1688]: time="2024-04-12T18:23:31.297178003Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:31.297738 env[1688]: time="2024-04-12T18:23:31.297674935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2 pid=3054 runtime=io.containerd.runc.v2 Apr 12 18:23:31.307000 audit[3063]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=3063 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:31.310987 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:23:31.311123 kernel: audit: type=1325 audit(1712946211.307:756): table=filter:69 family=2 entries=36 op=nft_register_chain pid=3063 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:31.307000 audit[3063]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffc5443a30 a2=0 a3=ffff8429dfa8 items=0 ppid=2804 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.332089 kernel: audit: type=1300 audit(1712946211.307:756): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffc5443a30 a2=0 a3=ffff8429dfa8 items=0 ppid=2804 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.307000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:31.343033 kernel: audit: type=1327 audit(1712946211.307:756): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:31.349526 systemd[1]: Started cri-containerd-63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2.scope. Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.394238 kernel: audit: type=1400 audit(1712946211.377:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.394313 kernel: audit: type=1400 audit(1712946211.377:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.394375 kernel: audit: type=1400 audit(1712946211.377:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.408986 kernel: audit: type=1400 audit(1712946211.377:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.417787 kernel: audit: type=1400 audit(1712946211.377:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.425803 kernel: audit: type=1400 audit(1712946211.377:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.436863 kernel: audit: type=1400 audit(1712946211.377:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit: BPF prog-id=94 op=LOAD Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3054 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653237616263326163623239353835653063643332356365316430 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3054 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653237616263326163623239353835653063643332356365316430 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.378000 audit: BPF prog-id=95 op=LOAD Apr 12 18:23:31.378000 audit[3065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3054 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653237616263326163623239353835653063643332356365316430 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.386000 audit: BPF prog-id=96 op=LOAD Apr 12 18:23:31.386000 audit[3065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3054 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653237616263326163623239353835653063643332356365316430 Apr 12 18:23:31.393000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:23:31.393000 audit: BPF prog-id=95 op=UNLOAD Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:31.393000 audit: BPF prog-id=97 op=LOAD Apr 12 18:23:31.393000 audit[3065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3054 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:31.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633653237616263326163623239353835653063643332356365316430 Apr 12 18:23:31.449651 env[1688]: time="2024-04-12T18:23:31.449580239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xf8x8,Uid:88b19468-bc5e-43ba-8826-4eb8be65240f,Namespace:calico-system,Attempt:1,} returns sandbox id \"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2\"" Apr 12 18:23:31.452706 env[1688]: time="2024-04-12T18:23:31.452650787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:23:31.658541 kubelet[2152]: E0412 18:23:31.658387 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:32.006454 systemd[1]: run-containerd-runc-k8s.io-63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2-runc.cnvdgj.mount: Deactivated successfully. Apr 12 18:23:32.042880 update_engine[1675]: I0412 18:23:32.042476 1675 update_attempter.cc:509] Updating boot flags... Apr 12 18:23:32.377683 systemd-networkd[1492]: calia86a62e53cf: Gained IPv6LL Apr 12 18:23:32.659142 kubelet[2152]: E0412 18:23:32.658858 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:32.850626 env[1688]: time="2024-04-12T18:23:32.850571612Z" level=info msg="StopPodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\"" Apr 12 18:23:32.890411 env[1688]: time="2024-04-12T18:23:32.890330490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:32.893520 env[1688]: time="2024-04-12T18:23:32.893450659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:32.896601 env[1688]: time="2024-04-12T18:23:32.896546299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:32.901286 env[1688]: time="2024-04-12T18:23:32.901203752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:32.903213 env[1688]: time="2024-04-12T18:23:32.903138669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:23:32.906628 env[1688]: time="2024-04-12T18:23:32.906570502Z" level=info msg="CreateContainer within sandbox \"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:23:32.931118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount753518107.mount: Deactivated successfully. Apr 12 18:23:32.936922 env[1688]: time="2024-04-12T18:23:32.936781973Z" level=info msg="CreateContainer within sandbox \"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8a16db31a879c0941ecb1f3fdb2d63e14a0f932467792f86ec54a5b57df63236\"" Apr 12 18:23:32.938133 env[1688]: time="2024-04-12T18:23:32.938086433Z" level=info msg="StartContainer for \"8a16db31a879c0941ecb1f3fdb2d63e14a0f932467792f86ec54a5b57df63236\"" Apr 12 18:23:32.993394 systemd[1]: Started cri-containerd-8a16db31a879c0941ecb1f3fdb2d63e14a0f932467792f86ec54a5b57df63236.scope. Apr 12 18:23:33.006618 systemd[1]: run-containerd-runc-k8s.io-8a16db31a879c0941ecb1f3fdb2d63e14a0f932467792f86ec54a5b57df63236-runc.yhhafq.mount: Deactivated successfully. Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3054 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313664623331613837396330393431656362316633666462326436 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.038000 audit: BPF prog-id=98 op=LOAD Apr 12 18:23:33.038000 audit[3305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3054 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313664623331613837396330393431656362316633666462326436 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.040000 audit: BPF prog-id=99 op=LOAD Apr 12 18:23:33.040000 audit[3305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3054 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313664623331613837396330393431656362316633666462326436 Apr 12 18:23:33.041000 audit: BPF prog-id=99 op=UNLOAD Apr 12 18:23:33.041000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { perfmon } for pid=3305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit[3305]: AVC avc: denied { bpf } for pid=3305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.041000 audit: BPF prog-id=100 op=LOAD Apr 12 18:23:33.041000 audit[3305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3054 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313664623331613837396330393431656362316633666462326436 Apr 12 18:23:33.099178 env[1688]: time="2024-04-12T18:23:33.099110919Z" level=info msg="StartContainer for \"8a16db31a879c0941ecb1f3fdb2d63e14a0f932467792f86ec54a5b57df63236\" returns successfully" Apr 12 18:23:33.101797 env[1688]: time="2024-04-12T18:23:33.101725420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.020 [INFO][3289] k8s.go 585: Cleaning up netns ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.020 [INFO][3289] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" iface="eth0" netns="/var/run/netns/cni-7dd4d727-5e4a-0ce1-44bc-6152db67bede" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.020 [INFO][3289] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" iface="eth0" netns="/var/run/netns/cni-7dd4d727-5e4a-0ce1-44bc-6152db67bede" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.021 [INFO][3289] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" iface="eth0" netns="/var/run/netns/cni-7dd4d727-5e4a-0ce1-44bc-6152db67bede" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.021 [INFO][3289] k8s.go 592: Releasing IP address(es) ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.021 [INFO][3289] utils.go 188: Calico CNI releasing IP address ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.076 [INFO][3323] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.077 [INFO][3323] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.077 [INFO][3323] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.106 [WARNING][3323] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.106 [INFO][3323] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.120 [INFO][3323] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:33.125455 env[1688]: 2024-04-12 18:23:33.123 [INFO][3289] k8s.go 598: Teardown processing complete. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:23:33.129520 systemd[1]: run-netns-cni\x2d7dd4d727\x2d5e4a\x2d0ce1\x2d44bc\x2d6152db67bede.mount: Deactivated successfully. Apr 12 18:23:33.130890 env[1688]: time="2024-04-12T18:23:33.130765222Z" level=info msg="TearDown network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" successfully" Apr 12 18:23:33.131013 env[1688]: time="2024-04-12T18:23:33.130892218Z" level=info msg="StopPodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" returns successfully" Apr 12 18:23:33.132093 env[1688]: time="2024-04-12T18:23:33.132019379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w6zt7,Uid:575bc052-131d-478c-959f-09c130d224fe,Namespace:default,Attempt:1,}" Apr 12 18:23:33.347365 (udev-worker)[3107]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:33.360260 systemd-networkd[1492]: calif195250e5ea: Link UP Apr 12 18:23:33.370057 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:23:33.370426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif195250e5ea: link becomes ready Apr 12 18:23:33.370698 systemd-networkd[1492]: calif195250e5ea: Gained carrier Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.229 [INFO][3339] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0 nginx-deployment-6d5f899847- default 575bc052-131d-478c-959f-09c130d224fe 959 0 2024-04-12 18:23:16 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.129 nginx-deployment-6d5f899847-w6zt7 eth0 default [] [] [kns.default ksa.default.default] calif195250e5ea [] []}} ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.229 [INFO][3339] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.281 [INFO][3350] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" HandleID="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.299 [INFO][3350] ipam_plugin.go 268: Auto assigning IP ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" HandleID="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029ba70), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.129", "pod":"nginx-deployment-6d5f899847-w6zt7", "timestamp":"2024-04-12 18:23:33.281476917 +0000 UTC"}, Hostname:"172.31.29.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.299 [INFO][3350] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.299 [INFO][3350] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.300 [INFO][3350] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.129' Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.302 [INFO][3350] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.308 [INFO][3350] ipam.go 372: Looking up existing affinities for host host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.316 [INFO][3350] ipam.go 489: Trying affinity for 192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.319 [INFO][3350] ipam.go 155: Attempting to load block cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.323 [INFO][3350] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.323 [INFO][3350] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.0/26 handle="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.326 [INFO][3350] ipam.go 1682: Creating new handle: k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3 Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.331 [INFO][3350] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.0/26 handle="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.340 [INFO][3350] ipam.go 1216: Successfully claimed IPs: [192.168.70.2/26] block=192.168.70.0/26 handle="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.341 [INFO][3350] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.2/26] handle="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" host="172.31.29.129" Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.341 [INFO][3350] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:33.397711 env[1688]: 2024-04-12 18:23:33.341 [INFO][3350] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.2/26] IPv6=[] ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" HandleID="k8s-pod-network.6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.399064 env[1688]: 2024-04-12 18:23:33.344 [INFO][3339] k8s.go 385: Populated endpoint ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"575bc052-131d-478c-959f-09c130d224fe", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"", Pod:"nginx-deployment-6d5f899847-w6zt7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif195250e5ea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:33.399064 env[1688]: 2024-04-12 18:23:33.344 [INFO][3339] k8s.go 386: Calico CNI using IPs: [192.168.70.2/32] ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.399064 env[1688]: 2024-04-12 18:23:33.344 [INFO][3339] dataplane_linux.go 68: Setting the host side veth name to calif195250e5ea ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.399064 env[1688]: 2024-04-12 18:23:33.371 [INFO][3339] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.399064 env[1688]: 2024-04-12 18:23:33.372 [INFO][3339] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"575bc052-131d-478c-959f-09c130d224fe", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3", Pod:"nginx-deployment-6d5f899847-w6zt7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif195250e5ea", MAC:"3e:e0:a1:e3:df:59", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:33.399064 env[1688]: 2024-04-12 18:23:33.392 [INFO][3339] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3" Namespace="default" Pod="nginx-deployment-6d5f899847-w6zt7" WorkloadEndpoint="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:23:33.427003 env[1688]: time="2024-04-12T18:23:33.426860082Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:33.427202 env[1688]: time="2024-04-12T18:23:33.427046802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:33.427202 env[1688]: time="2024-04-12T18:23:33.427130850Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:33.427708 env[1688]: time="2024-04-12T18:23:33.427618422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3 pid=3380 runtime=io.containerd.runc.v2 Apr 12 18:23:33.430000 audit[3381]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=3381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:33.430000 audit[3381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21560 a0=3 a1=fffffeac8ab0 a2=0 a3=ffff8c57ffa8 items=0 ppid=2804 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.430000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:33.470939 systemd[1]: Started cri-containerd-6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3.scope. Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.497000 audit: BPF prog-id=101 op=LOAD Apr 12 18:23:33.498000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.498000 audit[3392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3380 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363564633233333264633136323163326131343933646431633863 Apr 12 18:23:33.498000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.498000 audit[3392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3380 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363564633233333264633136323163326131343933646431633863 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit: BPF prog-id=102 op=LOAD Apr 12 18:23:33.499000 audit[3392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3380 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363564633233333264633136323163326131343933646431633863 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit: BPF prog-id=103 op=LOAD Apr 12 18:23:33.499000 audit[3392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3380 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363564633233333264633136323163326131343933646431633863 Apr 12 18:23:33.499000 audit: BPF prog-id=103 op=UNLOAD Apr 12 18:23:33.499000 audit: BPF prog-id=102 op=UNLOAD Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:33.499000 audit: BPF prog-id=104 op=LOAD Apr 12 18:23:33.499000 audit[3392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3380 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:33.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363564633233333264633136323163326131343933646431633863 Apr 12 18:23:33.541688 env[1688]: time="2024-04-12T18:23:33.541607072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w6zt7,Uid:575bc052-131d-478c-959f-09c130d224fe,Namespace:default,Attempt:1,} returns sandbox id \"6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3\"" Apr 12 18:23:33.660721 kubelet[2152]: E0412 18:23:33.659903 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:34.513248 env[1688]: time="2024-04-12T18:23:34.513183123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:34.516135 env[1688]: time="2024-04-12T18:23:34.516074704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:34.518762 env[1688]: time="2024-04-12T18:23:34.518713240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:34.521417 env[1688]: time="2024-04-12T18:23:34.521356865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:34.522465 env[1688]: time="2024-04-12T18:23:34.522420485Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:23:34.523910 env[1688]: time="2024-04-12T18:23:34.523783301Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:23:34.527954 env[1688]: time="2024-04-12T18:23:34.527890734Z" level=info msg="CreateContainer within sandbox \"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:23:34.550284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount457357927.mount: Deactivated successfully. Apr 12 18:23:34.557431 env[1688]: time="2024-04-12T18:23:34.557370060Z" level=info msg="CreateContainer within sandbox \"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5ac6f8f49ffb354519a3d7b13acaefefb29e6520380c5135fa93631a532216ea\"" Apr 12 18:23:34.559113 env[1688]: time="2024-04-12T18:23:34.559044829Z" level=info msg="StartContainer for \"5ac6f8f49ffb354519a3d7b13acaefefb29e6520380c5135fa93631a532216ea\"" Apr 12 18:23:34.604930 systemd[1]: Started cri-containerd-5ac6f8f49ffb354519a3d7b13acaefefb29e6520380c5135fa93631a532216ea.scope. Apr 12 18:23:34.648000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.648000 audit[3423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3054 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:34.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633666386634396666623335343531396133643762313361636165 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.649000 audit: BPF prog-id=105 op=LOAD Apr 12 18:23:34.649000 audit[3423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3054 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:34.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633666386634396666623335343531396133643762313361636165 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.650000 audit: BPF prog-id=106 op=LOAD Apr 12 18:23:34.650000 audit[3423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3054 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:34.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633666386634396666623335343531396133643762313361636165 Apr 12 18:23:34.651000 audit: BPF prog-id=106 op=UNLOAD Apr 12 18:23:34.651000 audit: BPF prog-id=105 op=UNLOAD Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:34.651000 audit: BPF prog-id=107 op=LOAD Apr 12 18:23:34.651000 audit[3423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3054 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:34.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633666386634396666623335343531396133643762313361636165 Apr 12 18:23:34.663129 kubelet[2152]: E0412 18:23:34.661205 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:34.683719 env[1688]: time="2024-04-12T18:23:34.683635671Z" level=info msg="StartContainer for \"5ac6f8f49ffb354519a3d7b13acaefefb29e6520380c5135fa93631a532216ea\" returns successfully" Apr 12 18:23:34.807593 kubelet[2152]: I0412 18:23:34.806759 2152 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:23:34.807593 kubelet[2152]: I0412 18:23:34.806857 2152 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:23:35.006800 systemd[1]: run-containerd-runc-k8s.io-5ac6f8f49ffb354519a3d7b13acaefefb29e6520380c5135fa93631a532216ea-runc.Y46Qui.mount: Deactivated successfully. Apr 12 18:23:35.008094 kubelet[2152]: I0412 18:23:35.008056 2152 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xf8x8" podStartSLOduration=28.936810211 podCreationTimestamp="2024-04-12 18:23:03 +0000 UTC" firstStartedPulling="2024-04-12 18:23:31.451750199 +0000 UTC m=+30.970554297" lastFinishedPulling="2024-04-12 18:23:34.522939377 +0000 UTC m=+34.041743547" observedRunningTime="2024-04-12 18:23:35.007870989 +0000 UTC m=+34.526675087" watchObservedRunningTime="2024-04-12 18:23:35.007999461 +0000 UTC m=+34.526803583" Apr 12 18:23:35.320122 systemd-networkd[1492]: calif195250e5ea: Gained IPv6LL Apr 12 18:23:35.662466 kubelet[2152]: E0412 18:23:35.662281 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:36.663610 kubelet[2152]: E0412 18:23:36.663549 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:37.664147 kubelet[2152]: E0412 18:23:37.664075 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:38.174965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2686447302.mount: Deactivated successfully. Apr 12 18:23:38.664435 kubelet[2152]: E0412 18:23:38.664365 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:39.664995 kubelet[2152]: E0412 18:23:39.664926 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:39.670970 env[1688]: time="2024-04-12T18:23:39.670913283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:39.675540 env[1688]: time="2024-04-12T18:23:39.675489376Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:39.678750 env[1688]: time="2024-04-12T18:23:39.678665968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:39.681764 env[1688]: time="2024-04-12T18:23:39.681715781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:39.683102 env[1688]: time="2024-04-12T18:23:39.683038673Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:23:39.686726 env[1688]: time="2024-04-12T18:23:39.686671685Z" level=info msg="CreateContainer within sandbox \"6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:23:39.706515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount425274655.mount: Deactivated successfully. Apr 12 18:23:39.718732 env[1688]: time="2024-04-12T18:23:39.718646206Z" level=info msg="CreateContainer within sandbox \"6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"d96ac04f4828f0f1221f8e26f30e8acac84a97b1ffd09e61ddd6c7fd1b189ff3\"" Apr 12 18:23:39.720010 env[1688]: time="2024-04-12T18:23:39.719962763Z" level=info msg="StartContainer for \"d96ac04f4828f0f1221f8e26f30e8acac84a97b1ffd09e61ddd6c7fd1b189ff3\"" Apr 12 18:23:39.767697 systemd[1]: Started cri-containerd-d96ac04f4828f0f1221f8e26f30e8acac84a97b1ffd09e61ddd6c7fd1b189ff3.scope. Apr 12 18:23:39.808897 kernel: kauditd_printk_skb: 196 callbacks suppressed Apr 12 18:23:39.809237 kernel: audit: type=1400 audit(1712946219.798:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816955 kernel: audit: type=1400 audit(1712946219.804:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.824551 kernel: audit: type=1400 audit(1712946219.804:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.832498 kernel: audit: type=1400 audit(1712946219.804:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.832807 kernel: audit: type=1400 audit(1712946219.804:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.847481 kernel: audit: type=1400 audit(1712946219.804:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.847944 kernel: audit: type=1400 audit(1712946219.804:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.868323 kernel: audit: type=1400 audit(1712946219.804:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.879297 kernel: audit: type=1400 audit(1712946219.804:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.879418 kernel: audit: type=1400 audit(1712946219.807:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit: BPF prog-id=108 op=LOAD Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3380 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366163303466343832386630663132323166386532366633306538 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3380 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366163303466343832386630663132323166386532366633306538 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.808000 audit: BPF prog-id=109 op=LOAD Apr 12 18:23:39.808000 audit[3475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3380 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366163303466343832386630663132323166386532366633306538 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit: BPF prog-id=110 op=LOAD Apr 12 18:23:39.816000 audit[3475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3380 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366163303466343832386630663132323166386532366633306538 Apr 12 18:23:39.816000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:23:39.816000 audit: BPF prog-id=109 op=UNLOAD Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { perfmon } for pid=3475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit[3475]: AVC avc: denied { bpf } for pid=3475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:39.816000 audit: BPF prog-id=111 op=LOAD Apr 12 18:23:39.816000 audit[3475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3380 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:39.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366163303466343832386630663132323166386532366633306538 Apr 12 18:23:39.900327 env[1688]: time="2024-04-12T18:23:39.900261783Z" level=info msg="StartContainer for \"d96ac04f4828f0f1221f8e26f30e8acac84a97b1ffd09e61ddd6c7fd1b189ff3\" returns successfully" Apr 12 18:23:40.008392 kubelet[2152]: I0412 18:23:40.005715 2152 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-w6zt7" podStartSLOduration=17.866011631 podCreationTimestamp="2024-04-12 18:23:16 +0000 UTC" firstStartedPulling="2024-04-12 18:23:33.543799041 +0000 UTC m=+33.062603151" lastFinishedPulling="2024-04-12 18:23:39.683452337 +0000 UTC m=+39.202256435" observedRunningTime="2024-04-12 18:23:40.004472523 +0000 UTC m=+39.523276633" watchObservedRunningTime="2024-04-12 18:23:40.005664915 +0000 UTC m=+39.524469037" Apr 12 18:23:40.665366 kubelet[2152]: E0412 18:23:40.665307 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:40.702635 systemd[1]: run-containerd-runc-k8s.io-d96ac04f4828f0f1221f8e26f30e8acac84a97b1ffd09e61ddd6c7fd1b189ff3-runc.fv2eqo.mount: Deactivated successfully. Apr 12 18:23:41.380211 systemd[1]: run-containerd-runc-k8s.io-ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd-runc.ee5P7u.mount: Deactivated successfully. Apr 12 18:23:41.635637 kubelet[2152]: E0412 18:23:41.635505 2152 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:41.665782 kubelet[2152]: E0412 18:23:41.665743 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:42.666868 kubelet[2152]: E0412 18:23:42.666811 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:43.267633 kubelet[2152]: I0412 18:23:43.266740 2152 topology_manager.go:215] "Topology Admit Handler" podUID="91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea" podNamespace="calico-apiserver" podName="calico-apiserver-65fdd7db56-fz4bk" Apr 12 18:23:43.281329 systemd[1]: Created slice kubepods-besteffort-pod91cc32ac_01eb_4b2c_8ecb_dca9f6abf3ea.slice. Apr 12 18:23:43.289000 audit[3543]: NETFILTER_CFG table=filter:71 family=2 entries=9 op=nft_register_rule pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.289000 audit[3543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffbde8c80 a2=0 a3=1 items=0 ppid=2382 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.295000 audit[3543]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.295000 audit[3543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffbde8c80 a2=0 a3=1 items=0 ppid=2382 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.311000 audit[3547]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=3547 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.311000 audit[3547]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe1df07f0 a2=0 a3=1 items=0 ppid=2382 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.313000 audit[3547]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3547 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:43.313000 audit[3547]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe1df07f0 a2=0 a3=1 items=0 ppid=2382 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:43.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:43.435103 kubelet[2152]: I0412 18:23:43.435046 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea-calico-apiserver-certs\") pod \"calico-apiserver-65fdd7db56-fz4bk\" (UID: \"91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea\") " pod="calico-apiserver/calico-apiserver-65fdd7db56-fz4bk" Apr 12 18:23:43.435282 kubelet[2152]: I0412 18:23:43.435160 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6fgzv\" (UniqueName: \"kubernetes.io/projected/91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea-kube-api-access-6fgzv\") pod \"calico-apiserver-65fdd7db56-fz4bk\" (UID: \"91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea\") " pod="calico-apiserver/calico-apiserver-65fdd7db56-fz4bk" Apr 12 18:23:43.536629 kubelet[2152]: E0412 18:23:43.536499 2152 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:23:43.536629 kubelet[2152]: E0412 18:23:43.536608 2152 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea-calico-apiserver-certs podName:91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea nodeName:}" failed. No retries permitted until 2024-04-12 18:23:44.036577267 +0000 UTC m=+43.555381365 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea-calico-apiserver-certs") pod "calico-apiserver-65fdd7db56-fz4bk" (UID: "91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea") : secret "calico-apiserver-certs" not found Apr 12 18:23:43.668172 kubelet[2152]: E0412 18:23:43.668134 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:44.186867 env[1688]: time="2024-04-12T18:23:44.186766265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65fdd7db56-fz4bk,Uid:91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:23:44.430955 (udev-worker)[3545]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:44.439106 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:23:44.439255 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali02396305df3: link becomes ready Apr 12 18:23:44.433611 systemd-networkd[1492]: cali02396305df3: Link UP Apr 12 18:23:44.439251 systemd-networkd[1492]: cali02396305df3: Gained carrier Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.286 [INFO][3553] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0 calico-apiserver-65fdd7db56- calico-apiserver 91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea 1037 0 2024-04-12 18:23:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65fdd7db56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.29.129 calico-apiserver-65fdd7db56-fz4bk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali02396305df3 [] []}} ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.287 [INFO][3553] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.334 [INFO][3564] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" HandleID="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Workload="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.368 [INFO][3564] ipam_plugin.go 268: Auto assigning IP ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" HandleID="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Workload="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263800), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.29.129", "pod":"calico-apiserver-65fdd7db56-fz4bk", "timestamp":"2024-04-12 18:23:44.334087186 +0000 UTC"}, Hostname:"172.31.29.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.368 [INFO][3564] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.368 [INFO][3564] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.368 [INFO][3564] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.129' Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.372 [INFO][3564] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.380 [INFO][3564] ipam.go 372: Looking up existing affinities for host host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.388 [INFO][3564] ipam.go 489: Trying affinity for 192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.392 [INFO][3564] ipam.go 155: Attempting to load block cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.396 [INFO][3564] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.396 [INFO][3564] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.0/26 handle="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.399 [INFO][3564] ipam.go 1682: Creating new handle: k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0 Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.408 [INFO][3564] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.0/26 handle="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.425 [INFO][3564] ipam.go 1216: Successfully claimed IPs: [192.168.70.3/26] block=192.168.70.0/26 handle="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.425 [INFO][3564] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.3/26] handle="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" host="172.31.29.129" Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.425 [INFO][3564] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:44.459145 env[1688]: 2024-04-12 18:23:44.425 [INFO][3564] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.3/26] IPv6=[] ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" HandleID="k8s-pod-network.2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Workload="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.462076 env[1688]: 2024-04-12 18:23:44.427 [INFO][3553] k8s.go 385: Populated endpoint ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0", GenerateName:"calico-apiserver-65fdd7db56-", Namespace:"calico-apiserver", SelfLink:"", UID:"91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65fdd7db56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"", Pod:"calico-apiserver-65fdd7db56-fz4bk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali02396305df3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.462076 env[1688]: 2024-04-12 18:23:44.428 [INFO][3553] k8s.go 386: Calico CNI using IPs: [192.168.70.3/32] ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.462076 env[1688]: 2024-04-12 18:23:44.428 [INFO][3553] dataplane_linux.go 68: Setting the host side veth name to cali02396305df3 ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.462076 env[1688]: 2024-04-12 18:23:44.440 [INFO][3553] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.462076 env[1688]: 2024-04-12 18:23:44.442 [INFO][3553] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0", GenerateName:"calico-apiserver-65fdd7db56-", Namespace:"calico-apiserver", SelfLink:"", UID:"91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65fdd7db56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0", Pod:"calico-apiserver-65fdd7db56-fz4bk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali02396305df3", MAC:"96:bc:4a:0c:0c:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:44.462076 env[1688]: 2024-04-12 18:23:44.455 [INFO][3553] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0" Namespace="calico-apiserver" Pod="calico-apiserver-65fdd7db56-fz4bk" WorkloadEndpoint="172.31.29.129-k8s-calico--apiserver--65fdd7db56--fz4bk-eth0" Apr 12 18:23:44.496441 env[1688]: time="2024-04-12T18:23:44.496322405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:44.496583 env[1688]: time="2024-04-12T18:23:44.496473305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:44.496645 env[1688]: time="2024-04-12T18:23:44.496560653Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:44.497328 env[1688]: time="2024-04-12T18:23:44.497224757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0 pid=3596 runtime=io.containerd.runc.v2 Apr 12 18:23:44.517000 audit[3608]: NETFILTER_CFG table=filter:75 family=2 entries=51 op=nft_register_chain pid=3608 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:44.517000 audit[3608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27764 a0=3 a1=ffffe4068480 a2=0 a3=ffffb80ddfa8 items=0 ppid=2804 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:44.538536 systemd[1]: Started cri-containerd-2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0.scope. Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.573000 audit: BPF prog-id=112 op=LOAD Apr 12 18:23:44.575000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.575000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3596 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263366333383837336466383464666631633238326435653030303566 Apr 12 18:23:44.575000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.575000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3596 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263366333383837336466383464666631633238326435653030303566 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit: BPF prog-id=113 op=LOAD Apr 12 18:23:44.576000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3596 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263366333383837336466383464666631633238326435653030303566 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit: BPF prog-id=114 op=LOAD Apr 12 18:23:44.576000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3596 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263366333383837336466383464666631633238326435653030303566 Apr 12 18:23:44.576000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:23:44.576000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:44.576000 audit: BPF prog-id=115 op=LOAD Apr 12 18:23:44.576000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3596 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:44.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263366333383837336466383464666631633238326435653030303566 Apr 12 18:23:44.618539 env[1688]: time="2024-04-12T18:23:44.618472711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65fdd7db56-fz4bk,Uid:91cc32ac-01eb-4b2c-8ecb-dca9f6abf3ea,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0\"" Apr 12 18:23:44.621657 env[1688]: time="2024-04-12T18:23:44.621567715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:23:44.669200 kubelet[2152]: E0412 18:23:44.669151 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:45.669693 kubelet[2152]: E0412 18:23:45.669611 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:46.006342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2256831594.mount: Deactivated successfully. Apr 12 18:23:46.136100 systemd-networkd[1492]: cali02396305df3: Gained IPv6LL Apr 12 18:23:46.670294 kubelet[2152]: E0412 18:23:46.670204 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:46.957307 kernel: kauditd_printk_skb: 119 callbacks suppressed Apr 12 18:23:46.957499 kernel: audit: type=1325 audit(1712946226.948:847): table=filter:76 family=2 entries=22 op=nft_register_rule pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:46.948000 audit[3638]: NETFILTER_CFG table=filter:76 family=2 entries=22 op=nft_register_rule pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:46.948000 audit[3638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffd4388dc0 a2=0 a3=1 items=0 ppid=2382 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:46.971959 kernel: audit: type=1300 audit(1712946226.948:847): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffd4388dc0 a2=0 a3=1 items=0 ppid=2382 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.978257 kernel: audit: type=1327 audit(1712946226.948:847): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:46.958000 audit[3638]: NETFILTER_CFG table=nat:77 family=2 entries=20 op=nft_register_rule pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:46.958000 audit[3638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd4388dc0 a2=0 a3=1 items=0 ppid=2382 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.997158 kernel: audit: type=1325 audit(1712946226.958:848): table=nat:77 family=2 entries=20 op=nft_register_rule pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:46.997276 kernel: audit: type=1300 audit(1712946226.958:848): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd4388dc0 a2=0 a3=1 items=0 ppid=2382 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:46.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.003336 kernel: audit: type=1327 audit(1712946226.958:848): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.025000 audit[3640]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_rule pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.033854 kernel: audit: type=1325 audit(1712946227.025:849): table=filter:78 family=2 entries=34 op=nft_register_rule pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.025000 audit[3640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffd2de3770 a2=0 a3=1 items=0 ppid=2382 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.052508 kernel: audit: type=1300 audit(1712946227.025:849): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffd2de3770 a2=0 a3=1 items=0 ppid=2382 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.052687 kernel: audit: type=1327 audit(1712946227.025:849): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.045000 audit[3640]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.059679 kernel: audit: type=1325 audit(1712946227.045:850): table=nat:79 family=2 entries=20 op=nft_register_rule pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:47.045000 audit[3640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd2de3770 a2=0 a3=1 items=0 ppid=2382 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:47.085122 kubelet[2152]: I0412 18:23:47.084198 2152 topology_manager.go:215] "Topology Admit Handler" podUID="da39c90e-99be-4ba9-a605-4f9f3edd5bbe" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 18:23:47.095999 systemd[1]: Created slice kubepods-besteffort-podda39c90e_99be_4ba9_a605_4f9f3edd5bbe.slice. Apr 12 18:23:47.261856 kubelet[2152]: I0412 18:23:47.260587 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qmkzb\" (UniqueName: \"kubernetes.io/projected/da39c90e-99be-4ba9-a605-4f9f3edd5bbe-kube-api-access-qmkzb\") pod \"nfs-server-provisioner-0\" (UID: \"da39c90e-99be-4ba9-a605-4f9f3edd5bbe\") " pod="default/nfs-server-provisioner-0" Apr 12 18:23:47.261856 kubelet[2152]: I0412 18:23:47.260675 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/da39c90e-99be-4ba9-a605-4f9f3edd5bbe-data\") pod \"nfs-server-provisioner-0\" (UID: \"da39c90e-99be-4ba9-a605-4f9f3edd5bbe\") " pod="default/nfs-server-provisioner-0" Apr 12 18:23:47.414866 env[1688]: time="2024-04-12T18:23:47.414527868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:da39c90e-99be-4ba9-a605-4f9f3edd5bbe,Namespace:default,Attempt:0,}" Apr 12 18:23:47.670630 kubelet[2152]: E0412 18:23:47.670518 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:47.811950 systemd-networkd[1492]: cali60e51b789ff: Link UP Apr 12 18:23:47.816463 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:23:47.816520 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:23:47.816815 systemd-networkd[1492]: cali60e51b789ff: Gained carrier Apr 12 18:23:47.817969 (udev-worker)[3668]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.536 [INFO][3644] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.129-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default da39c90e-99be-4ba9-a605-4f9f3edd5bbe 1086 0 2024-04-12 18:23:47 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.29.129 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.536 [INFO][3644] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.596 [INFO][3662] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" HandleID="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Workload="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.661 [INFO][3662] ipam_plugin.go 268: Auto assigning IP ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" HandleID="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Workload="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002eb650), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.129", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:23:47.596804273 +0000 UTC"}, Hostname:"172.31.29.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.661 [INFO][3662] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.661 [INFO][3662] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.661 [INFO][3662] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.129' Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.673 [INFO][3662] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.686 [INFO][3662] ipam.go 372: Looking up existing affinities for host host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.714 [INFO][3662] ipam.go 489: Trying affinity for 192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.720 [INFO][3662] ipam.go 155: Attempting to load block cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.731 [INFO][3662] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.731 [INFO][3662] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.0/26 handle="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.748 [INFO][3662] ipam.go 1682: Creating new handle: k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.769 [INFO][3662] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.0/26 handle="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.802 [INFO][3662] ipam.go 1216: Successfully claimed IPs: [192.168.70.4/26] block=192.168.70.0/26 handle="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.802 [INFO][3662] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.4/26] handle="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" host="172.31.29.129" Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.803 [INFO][3662] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:23:47.842112 env[1688]: 2024-04-12 18:23:47.803 [INFO][3662] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.4/26] IPv6=[] ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" HandleID="k8s-pod-network.62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Workload="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.843687 env[1688]: 2024-04-12 18:23:47.805 [INFO][3644] k8s.go 385: Populated endpoint ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"da39c90e-99be-4ba9-a605-4f9f3edd5bbe", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.70.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:47.843687 env[1688]: 2024-04-12 18:23:47.806 [INFO][3644] k8s.go 386: Calico CNI using IPs: [192.168.70.4/32] ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.843687 env[1688]: 2024-04-12 18:23:47.806 [INFO][3644] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.843687 env[1688]: 2024-04-12 18:23:47.821 [INFO][3644] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.844109 env[1688]: 2024-04-12 18:23:47.822 [INFO][3644] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"da39c90e-99be-4ba9-a605-4f9f3edd5bbe", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.70.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"06:09:ab:6c:88:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:23:47.844109 env[1688]: 2024-04-12 18:23:47.836 [INFO][3644] k8s.go 498: Wrote updated endpoint to datastore ContainerID="62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:23:47.892000 audit[3683]: NETFILTER_CFG table=filter:80 family=2 entries=42 op=nft_register_chain pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:23:47.892000 audit[3683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21008 a0=3 a1=ffffe2aa1de0 a2=0 a3=ffff88413fa8 items=0 ppid=2804 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:47.892000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:23:47.905021 env[1688]: time="2024-04-12T18:23:47.904425322Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:23:47.905021 env[1688]: time="2024-04-12T18:23:47.904490266Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:23:47.905021 env[1688]: time="2024-04-12T18:23:47.904515790Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:23:47.905021 env[1688]: time="2024-04-12T18:23:47.904762415Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f pid=3691 runtime=io.containerd.runc.v2 Apr 12 18:23:47.968190 systemd[1]: Started cri-containerd-62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f.scope. Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.008000 audit: BPF prog-id=116 op=LOAD Apr 12 18:23:48.010000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.010000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3691 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632663964313336343365663931363838623231313735316630333637 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3691 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632663964313336343365663931363838623231313735316630333637 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit: BPF prog-id=117 op=LOAD Apr 12 18:23:48.011000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3691 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632663964313336343365663931363838623231313735316630333637 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit: BPF prog-id=118 op=LOAD Apr 12 18:23:48.011000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3691 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632663964313336343365663931363838623231313735316630333637 Apr 12 18:23:48.011000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:23:48.011000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.011000 audit: BPF prog-id=119 op=LOAD Apr 12 18:23:48.011000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3691 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632663964313336343365663931363838623231313735316630333637 Apr 12 18:23:48.077239 env[1688]: time="2024-04-12T18:23:48.076206262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:da39c90e-99be-4ba9-a605-4f9f3edd5bbe,Namespace:default,Attempt:0,} returns sandbox id \"62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f\"" Apr 12 18:23:48.274586 env[1688]: time="2024-04-12T18:23:48.274450504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.279281 env[1688]: time="2024-04-12T18:23:48.279214757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.281645 env[1688]: time="2024-04-12T18:23:48.281570033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.284206 env[1688]: time="2024-04-12T18:23:48.284157329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:48.285110 env[1688]: time="2024-04-12T18:23:48.285067409Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:23:48.287702 env[1688]: time="2024-04-12T18:23:48.287628581Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:23:48.292081 env[1688]: time="2024-04-12T18:23:48.291506718Z" level=info msg="CreateContainer within sandbox \"2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:23:48.309648 env[1688]: time="2024-04-12T18:23:48.309557527Z" level=info msg="CreateContainer within sandbox \"2c6c38873df84dff1c282d5e0005fe585ceff55565ba33e0ab5767ccd7681df0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"196dfddc8ac47555a5e16c0854d15d6277f0f0880d1c7963e6814c51d70f5535\"" Apr 12 18:23:48.310594 env[1688]: time="2024-04-12T18:23:48.310545619Z" level=info msg="StartContainer for \"196dfddc8ac47555a5e16c0854d15d6277f0f0880d1c7963e6814c51d70f5535\"" Apr 12 18:23:48.347800 systemd[1]: Started cri-containerd-196dfddc8ac47555a5e16c0854d15d6277f0f0880d1c7963e6814c51d70f5535.scope. Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.382000 audit: BPF prog-id=120 op=LOAD Apr 12 18:23:48.388045 systemd[1]: run-containerd-runc-k8s.io-62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f-runc.Q10vPp.mount: Deactivated successfully. Apr 12 18:23:48.392000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.392000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3596 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366466646463386163343735353561356531366330383534643135 Apr 12 18:23:48.392000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.392000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3596 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366466646463386163343735353561356531366330383534643135 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.393000 audit: BPF prog-id=121 op=LOAD Apr 12 18:23:48.393000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3596 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366466646463386163343735353561356531366330383534643135 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.395000 audit: BPF prog-id=122 op=LOAD Apr 12 18:23:48.395000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3596 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366466646463386163343735353561356531366330383534643135 Apr 12 18:23:48.396000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:23:48.396000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:48.396000 audit: BPF prog-id=123 op=LOAD Apr 12 18:23:48.396000 audit[3734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3596 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:48.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366466646463386163343735353561356531366330383534643135 Apr 12 18:23:48.444689 env[1688]: time="2024-04-12T18:23:48.444630680Z" level=info msg="StartContainer for \"196dfddc8ac47555a5e16c0854d15d6277f0f0880d1c7963e6814c51d70f5535\" returns successfully" Apr 12 18:23:48.671135 kubelet[2152]: E0412 18:23:48.671071 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:49.080174 systemd-networkd[1492]: cali60e51b789ff: Gained IPv6LL Apr 12 18:23:49.134000 audit[3768]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_rule pid=3768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.134000 audit[3768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffed1354a0 a2=0 a3=1 items=0 ppid=2382 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.136000 audit[3768]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=3768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.136000 audit[3768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffed1354a0 a2=0 a3=1 items=0 ppid=2382 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.226000 audit[3770]: NETFILTER_CFG table=filter:83 family=2 entries=34 op=nft_register_rule pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.226000 audit[3770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffda1a7860 a2=0 a3=1 items=0 ppid=2382 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.239000 audit[3770]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:49.239000 audit[3770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffda1a7860 a2=0 a3=1 items=0 ppid=2382 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:49.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:49.671662 kubelet[2152]: E0412 18:23:49.671595 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:50.043000 audit[3746]: AVC avc: denied { watch } for pid=3746 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_23_44.794399512/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c905 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c675,c905 tclass=file permissive=0 Apr 12 18:23:50.043000 audit[3746]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005e9dc0 a2=fc6 a3=0 items=0 ppid=3596 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c905 key=(null) Apr 12 18:23:50.043000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:23:50.672184 kubelet[2152]: E0412 18:23:50.672108 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:51.672530 kubelet[2152]: E0412 18:23:51.672472 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:51.858416 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3632163922.mount: Deactivated successfully. Apr 12 18:23:52.673212 kubelet[2152]: E0412 18:23:52.673147 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:53.673961 kubelet[2152]: E0412 18:23:53.673869 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:54.674507 kubelet[2152]: E0412 18:23:54.674448 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:55.423018 env[1688]: time="2024-04-12T18:23:55.422948737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:55.426090 env[1688]: time="2024-04-12T18:23:55.426029809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:55.429401 env[1688]: time="2024-04-12T18:23:55.429350461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:55.432952 env[1688]: time="2024-04-12T18:23:55.432889537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:23:55.434638 env[1688]: time="2024-04-12T18:23:55.434561065Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Apr 12 18:23:55.440496 env[1688]: time="2024-04-12T18:23:55.440420630Z" level=info msg="CreateContainer within sandbox \"62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:23:55.460161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1994641730.mount: Deactivated successfully. Apr 12 18:23:55.471352 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2078926216.mount: Deactivated successfully. Apr 12 18:23:55.475581 env[1688]: time="2024-04-12T18:23:55.475516720Z" level=info msg="CreateContainer within sandbox \"62f9d13643ef91688b211751f03672aa6d4916d7780f17710beabbb4d27b591f\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1a18e72fadebe4aa6d50e01479d199bbe154c4b96abb65215616c0e3127f64d5\"" Apr 12 18:23:55.477228 env[1688]: time="2024-04-12T18:23:55.477140368Z" level=info msg="StartContainer for \"1a18e72fadebe4aa6d50e01479d199bbe154c4b96abb65215616c0e3127f64d5\"" Apr 12 18:23:55.525183 systemd[1]: Started cri-containerd-1a18e72fadebe4aa6d50e01479d199bbe154c4b96abb65215616c0e3127f64d5.scope. Apr 12 18:23:55.563810 kernel: kauditd_printk_skb: 134 callbacks suppressed Apr 12 18:23:55.564004 kernel: audit: type=1400 audit(1712946235.553:893): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571632 kernel: audit: type=1400 audit(1712946235.556:894): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.580947 kernel: audit: type=1400 audit(1712946235.556:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.581071 kernel: audit: type=1400 audit(1712946235.556:896): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.595701 kernel: audit: type=1400 audit(1712946235.556:897): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.604116 kernel: audit: type=1400 audit(1712946235.556:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.611958 kernel: audit: type=1400 audit(1712946235.556:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.620920 kernel: audit: type=1400 audit(1712946235.556:900): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.628932 kernel: audit: type=1400 audit(1712946235.556:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.636744 kernel: audit: type=1400 audit(1712946235.563:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit: BPF prog-id=124 op=LOAD Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3691 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:55.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313865373266616465626534616136643530653031343739643139 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3691 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:55.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313865373266616465626534616136643530653031343739643139 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.563000 audit: BPF prog-id=125 op=LOAD Apr 12 18:23:55.563000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3691 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:55.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313865373266616465626534616136643530653031343739643139 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit: BPF prog-id=126 op=LOAD Apr 12 18:23:55.571000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3691 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:55.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313865373266616465626534616136643530653031343739643139 Apr 12 18:23:55.571000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:23:55.571000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:23:55.571000 audit: BPF prog-id=127 op=LOAD Apr 12 18:23:55.571000 audit[3782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3691 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:55.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313865373266616465626534616136643530653031343739643139 Apr 12 18:23:55.645374 env[1688]: time="2024-04-12T18:23:55.645218582Z" level=info msg="StartContainer for \"1a18e72fadebe4aa6d50e01479d199bbe154c4b96abb65215616c0e3127f64d5\" returns successfully" Apr 12 18:23:55.675148 kubelet[2152]: E0412 18:23:55.674980 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:55.752000 audit[3809]: AVC avc: denied { search } for pid=3809 comm="rpcbind" name="crypto" dev="proc" ino=20015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:23:55.752000 audit[3809]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb9f8f000 a2=0 a3=0 items=0 ppid=3792 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 key=(null) Apr 12 18:23:55.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:23:55.832000 audit[3814]: AVC avc: denied { search } for pid=3814 comm="dbus-daemon" name="crypto" dev="proc" ino=20015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:23:55.832000 audit[3814]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9edcf000 a2=0 a3=0 items=0 ppid=3792 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 key=(null) Apr 12 18:23:55.832000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:23:55.839000 audit[3815]: AVC avc: denied { watch } for pid=3815 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538056 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c110,c324 tclass=dir permissive=0 Apr 12 18:23:55.839000 audit[3815]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab0b085af0 a2=2c8 a3=aaab0b066a60 items=0 ppid=3792 pid=3815 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 key=(null) Apr 12 18:23:55.839000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:23:55.846000 audit[3816]: AVC avc: denied { read } for pid=3816 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:23:55.846000 audit[3816]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa4fda570 a2=80000 a3=0 items=0 ppid=3792 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 key=(null) Apr 12 18:23:55.846000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:23:55.848000 audit[3816]: AVC avc: denied { search } for pid=3816 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:23:55.848000 audit[3816]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa436f000 a2=0 a3=0 items=0 ppid=3792 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c324 key=(null) Apr 12 18:23:55.848000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:23:56.081251 kubelet[2152]: I0412 18:23:56.081099 2152 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65fdd7db56-fz4bk" podStartSLOduration=9.416147497 podCreationTimestamp="2024-04-12 18:23:43 +0000 UTC" firstStartedPulling="2024-04-12 18:23:44.620806951 +0000 UTC m=+44.139611049" lastFinishedPulling="2024-04-12 18:23:48.285707477 +0000 UTC m=+47.804511575" observedRunningTime="2024-04-12 18:23:49.069532211 +0000 UTC m=+48.588336357" watchObservedRunningTime="2024-04-12 18:23:56.081048023 +0000 UTC m=+55.599852121" Apr 12 18:23:56.082415 kubelet[2152]: I0412 18:23:56.082370 2152 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.724816549 podCreationTimestamp="2024-04-12 18:23:47 +0000 UTC" firstStartedPulling="2024-04-12 18:23:48.078603695 +0000 UTC m=+47.597407793" lastFinishedPulling="2024-04-12 18:23:55.434996305 +0000 UTC m=+54.953800403" observedRunningTime="2024-04-12 18:23:56.081028511 +0000 UTC m=+55.599832609" watchObservedRunningTime="2024-04-12 18:23:56.081209159 +0000 UTC m=+55.600013269" Apr 12 18:23:56.108000 audit[3821]: NETFILTER_CFG table=filter:85 family=2 entries=22 op=nft_register_rule pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:56.108000 audit[3821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc1921290 a2=0 a3=1 items=0 ppid=2382 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:56.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:56.112000 audit[3821]: NETFILTER_CFG table=nat:86 family=2 entries=104 op=nft_register_chain pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:23:56.112000 audit[3821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffc1921290 a2=0 a3=1 items=0 ppid=2382 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:23:56.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:23:56.675367 kubelet[2152]: E0412 18:23:56.675305 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:57.676379 kubelet[2152]: E0412 18:23:57.676301 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:58.677145 kubelet[2152]: E0412 18:23:58.677104 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:23:59.678320 kubelet[2152]: E0412 18:23:59.678260 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:00.678858 kubelet[2152]: E0412 18:24:00.678796 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:01.635207 kubelet[2152]: E0412 18:24:01.635149 2152 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:01.680179 kubelet[2152]: E0412 18:24:01.680147 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:01.696424 env[1688]: time="2024-04-12T18:24:01.696362040Z" level=info msg="StopPodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\"" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.760 [WARNING][3843] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"575bc052-131d-478c-959f-09c130d224fe", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3", Pod:"nginx-deployment-6d5f899847-w6zt7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif195250e5ea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.761 [INFO][3843] k8s.go 585: Cleaning up netns ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.761 [INFO][3843] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" iface="eth0" netns="" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.761 [INFO][3843] k8s.go 592: Releasing IP address(es) ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.761 [INFO][3843] utils.go 188: Calico CNI releasing IP address ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.801 [INFO][3849] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.801 [INFO][3849] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.802 [INFO][3849] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.821 [WARNING][3849] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.821 [INFO][3849] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.824 [INFO][3849] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:24:01.828782 env[1688]: 2024-04-12 18:24:01.826 [INFO][3843] k8s.go 598: Teardown processing complete. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.829854 env[1688]: time="2024-04-12T18:24:01.828850674Z" level=info msg="TearDown network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" successfully" Apr 12 18:24:01.829854 env[1688]: time="2024-04-12T18:24:01.828898434Z" level=info msg="StopPodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" returns successfully" Apr 12 18:24:01.830258 env[1688]: time="2024-04-12T18:24:01.830089470Z" level=info msg="RemovePodSandbox for \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\"" Apr 12 18:24:01.830258 env[1688]: time="2024-04-12T18:24:01.830184054Z" level=info msg="Forcibly stopping sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\"" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.902 [WARNING][3868] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"575bc052-131d-478c-959f-09c130d224fe", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"6065dc2332dc1621c2a1493dd1c8c7b10503a11c4ad02e95c11a259286112ad3", Pod:"nginx-deployment-6d5f899847-w6zt7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif195250e5ea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.902 [INFO][3868] k8s.go 585: Cleaning up netns ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.902 [INFO][3868] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" iface="eth0" netns="" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.902 [INFO][3868] k8s.go 592: Releasing IP address(es) ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.902 [INFO][3868] utils.go 188: Calico CNI releasing IP address ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.968 [INFO][3877] ipam_plugin.go 415: Releasing address using handleID ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.968 [INFO][3877] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.968 [INFO][3877] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.985 [WARNING][3877] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.985 [INFO][3877] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" HandleID="k8s-pod-network.3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Workload="172.31.29.129-k8s-nginx--deployment--6d5f899847--w6zt7-eth0" Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.989 [INFO][3877] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:24:01.994190 env[1688]: 2024-04-12 18:24:01.992 [INFO][3868] k8s.go 598: Teardown processing complete. ContainerID="3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084" Apr 12 18:24:01.994190 env[1688]: time="2024-04-12T18:24:01.994159860Z" level=info msg="TearDown network for sandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" successfully" Apr 12 18:24:01.999056 env[1688]: time="2024-04-12T18:24:01.998951473Z" level=info msg="RemovePodSandbox \"3e61042ba2e4e700c27c3da607f6640598497fca8565cb1b516614c624d16084\" returns successfully" Apr 12 18:24:02.000076 env[1688]: time="2024-04-12T18:24:01.999989005Z" level=info msg="StopPodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\"" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.062 [WARNING][3896] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-csi--node--driver--xf8x8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88b19468-bc5e-43ba-8826-4eb8be65240f", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2", Pod:"csi-node-driver-xf8x8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia86a62e53cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.062 [INFO][3896] k8s.go 585: Cleaning up netns ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.062 [INFO][3896] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" iface="eth0" netns="" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.062 [INFO][3896] k8s.go 592: Releasing IP address(es) ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.062 [INFO][3896] utils.go 188: Calico CNI releasing IP address ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.097 [INFO][3902] ipam_plugin.go 415: Releasing address using handleID ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.097 [INFO][3902] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.097 [INFO][3902] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.111 [WARNING][3902] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.111 [INFO][3902] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.115 [INFO][3902] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:24:02.119652 env[1688]: 2024-04-12 18:24:02.117 [INFO][3896] k8s.go 598: Teardown processing complete. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.120951 env[1688]: time="2024-04-12T18:24:02.119697997Z" level=info msg="TearDown network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" successfully" Apr 12 18:24:02.120951 env[1688]: time="2024-04-12T18:24:02.119743525Z" level=info msg="StopPodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" returns successfully" Apr 12 18:24:02.120951 env[1688]: time="2024-04-12T18:24:02.120559321Z" level=info msg="RemovePodSandbox for \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\"" Apr 12 18:24:02.120951 env[1688]: time="2024-04-12T18:24:02.120610393Z" level=info msg="Forcibly stopping sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\"" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.182 [WARNING][3920] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-csi--node--driver--xf8x8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88b19468-bc5e-43ba-8826-4eb8be65240f", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"63e27abc2acb29585e0cd325ce1d03783c2ee6b27db9a4ef888bd35a90d7a5b2", Pod:"csi-node-driver-xf8x8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia86a62e53cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.182 [INFO][3920] k8s.go 585: Cleaning up netns ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.182 [INFO][3920] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" iface="eth0" netns="" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.182 [INFO][3920] k8s.go 592: Releasing IP address(es) ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.182 [INFO][3920] utils.go 188: Calico CNI releasing IP address ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.220 [INFO][3927] ipam_plugin.go 415: Releasing address using handleID ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.220 [INFO][3927] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.220 [INFO][3927] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.237 [WARNING][3927] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.237 [INFO][3927] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" HandleID="k8s-pod-network.2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Workload="172.31.29.129-k8s-csi--node--driver--xf8x8-eth0" Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.240 [INFO][3927] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:24:02.244856 env[1688]: 2024-04-12 18:24:02.242 [INFO][3920] k8s.go 598: Teardown processing complete. ContainerID="2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1" Apr 12 18:24:02.244856 env[1688]: time="2024-04-12T18:24:02.244677078Z" level=info msg="TearDown network for sandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" successfully" Apr 12 18:24:02.251592 env[1688]: time="2024-04-12T18:24:02.251532967Z" level=info msg="RemovePodSandbox \"2d2d9d1cc2e0163a8595db799bd347053824f12dae78bc09bbe0c8eac9d352a1\" returns successfully" Apr 12 18:24:02.681500 kubelet[2152]: E0412 18:24:02.681463 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:03.682516 kubelet[2152]: E0412 18:24:03.682436 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:04.682985 kubelet[2152]: E0412 18:24:04.682926 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:05.683958 kubelet[2152]: E0412 18:24:05.683897 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:06.684267 kubelet[2152]: E0412 18:24:06.684201 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:07.685356 kubelet[2152]: E0412 18:24:07.685302 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:08.686834 kubelet[2152]: E0412 18:24:08.686768 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:09.687851 kubelet[2152]: E0412 18:24:09.687760 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:10.688457 kubelet[2152]: E0412 18:24:10.688415 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:11.386096 systemd[1]: run-containerd-runc-k8s.io-ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd-runc.zRKRIU.mount: Deactivated successfully. Apr 12 18:24:11.689324 kubelet[2152]: E0412 18:24:11.689227 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:12.689756 kubelet[2152]: E0412 18:24:12.689713 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:13.691456 kubelet[2152]: E0412 18:24:13.691334 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:14.216716 systemd[1]: run-containerd-runc-k8s.io-196dfddc8ac47555a5e16c0854d15d6277f0f0880d1c7963e6814c51d70f5535-runc.Htgbom.mount: Deactivated successfully. Apr 12 18:24:14.310476 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:24:14.310638 kernel: audit: type=1325 audit(1712946254.303:918): table=filter:87 family=2 entries=9 op=nft_register_rule pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.303000 audit[4005]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.303000 audit[4005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff7543870 a2=0 a3=1 items=0 ppid=2382 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.323759 kernel: audit: type=1300 audit(1712946254.303:918): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff7543870 a2=0 a3=1 items=0 ppid=2382 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.323888 kernel: audit: type=1327 audit(1712946254.303:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.306000 audit[4005]: NETFILTER_CFG table=nat:88 family=2 entries=51 op=nft_register_chain pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.306000 audit[4005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=fffff7543870 a2=0 a3=1 items=0 ppid=2382 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.347656 kernel: audit: type=1325 audit(1712946254.306:919): table=nat:88 family=2 entries=51 op=nft_register_chain pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.347755 kernel: audit: type=1300 audit(1712946254.306:919): arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=fffff7543870 a2=0 a3=1 items=0 ppid=2382 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.353210 kernel: audit: type=1327 audit(1712946254.306:919): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.371000 audit[4007]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.371000 audit[4007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc26b7680 a2=0 a3=1 items=0 ppid=2382 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.389676 kernel: audit: type=1325 audit(1712946254.371:920): table=filter:89 family=2 entries=8 op=nft_register_rule pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.389772 kernel: audit: type=1300 audit(1712946254.371:920): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc26b7680 a2=0 a3=1 items=0 ppid=2382 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.395977 kernel: audit: type=1327 audit(1712946254.371:920): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.376000 audit[4007]: NETFILTER_CFG table=nat:90 family=2 entries=58 op=nft_register_chain pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.376000 audit[4007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffc26b7680 a2=0 a3=1 items=0 ppid=2382 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:14.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:24:14.402858 kernel: audit: type=1325 audit(1712946254.376:921): table=nat:90 family=2 entries=58 op=nft_register_chain pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:24:14.692367 kubelet[2152]: E0412 18:24:14.692307 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:15.693017 kubelet[2152]: E0412 18:24:15.692979 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:16.694326 kubelet[2152]: E0412 18:24:16.694261 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:17.695481 kubelet[2152]: E0412 18:24:17.695416 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:18.696212 kubelet[2152]: E0412 18:24:18.696152 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:19.696371 kubelet[2152]: E0412 18:24:19.696309 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:20.697540 kubelet[2152]: E0412 18:24:20.697470 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:20.758342 kubelet[2152]: I0412 18:24:20.758300 2152 topology_manager.go:215] "Topology Admit Handler" podUID="58b24771-1072-4df1-9e55-f49c725cfd71" podNamespace="default" podName="test-pod-1" Apr 12 18:24:20.767679 systemd[1]: Created slice kubepods-besteffort-pod58b24771_1072_4df1_9e55_f49c725cfd71.slice. Apr 12 18:24:20.867354 kubelet[2152]: I0412 18:24:20.867298 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3db51ee8-1af5-4aa6-a353-1f20c5264d02\" (UniqueName: \"kubernetes.io/nfs/58b24771-1072-4df1-9e55-f49c725cfd71-pvc-3db51ee8-1af5-4aa6-a353-1f20c5264d02\") pod \"test-pod-1\" (UID: \"58b24771-1072-4df1-9e55-f49c725cfd71\") " pod="default/test-pod-1" Apr 12 18:24:20.867537 kubelet[2152]: I0412 18:24:20.867380 2152 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-42gqv\" (UniqueName: \"kubernetes.io/projected/58b24771-1072-4df1-9e55-f49c725cfd71-kube-api-access-42gqv\") pod \"test-pod-1\" (UID: \"58b24771-1072-4df1-9e55-f49c725cfd71\") " pod="default/test-pod-1" Apr 12 18:24:20.998367 kernel: Failed to create system directory netfs Apr 12 18:24:20.998622 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:24:20.998681 kernel: audit: type=1400 audit(1712946260.994:922): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:20.994000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.008553 kernel: Failed to create system directory netfs Apr 12 18:24:21.008662 kernel: audit: type=1400 audit(1712946260.994:922): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:20.994000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.018604 kernel: Failed to create system directory netfs Apr 12 18:24:21.018684 kernel: audit: type=1400 audit(1712946260.994:922): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:20.994000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.028655 kernel: Failed to create system directory netfs Apr 12 18:24:21.028740 kernel: audit: type=1400 audit(1712946260.994:922): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:20.994000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.046255 kernel: Failed to create system directory fscache Apr 12 18:24:21.046379 kernel: Failed to create system directory fscache Apr 12 18:24:21.046427 kernel: audit: type=1300 audit(1712946260.994:922): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae50a35e0 a1=12c14 a2=aaaaccb5e028 a3=aaaae5094010 items=0 ppid=539 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:20.994000 audit[4016]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae50a35e0 a1=12c14 a2=aaaaccb5e028 a3=aaaae5094010 items=0 ppid=539 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.058326 kernel: Failed to create system directory fscache Apr 12 18:24:21.058413 kernel: audit: type=1327 audit(1712946260.994:922): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:24:20.994000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:24:21.064140 kernel: Failed to create system directory fscache Apr 12 18:24:21.064199 kernel: audit: type=1400 audit(1712946261.037:923): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.074196 kernel: Failed to create system directory fscache Apr 12 18:24:21.074288 kernel: audit: type=1400 audit(1712946261.037:923): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.084304 kernel: Failed to create system directory fscache Apr 12 18:24:21.084383 kernel: audit: type=1400 audit(1712946261.037:923): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.094438 kernel: Failed to create system directory fscache Apr 12 18:24:21.094491 kernel: audit: type=1400 audit(1712946261.037:923): avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.102931 kernel: Failed to create system directory fscache Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.106425 kernel: Failed to create system directory fscache Apr 12 18:24:21.106489 kernel: Failed to create system directory fscache Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.110092 kernel: Failed to create system directory fscache Apr 12 18:24:21.110176 kernel: Failed to create system directory fscache Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.113775 kernel: Failed to create system directory fscache Apr 12 18:24:21.113854 kernel: Failed to create system directory fscache Apr 12 18:24:21.037000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.037000 audit[4016]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae52b6210 a1=4c344 a2=aaaaccb5e028 a3=aaaae5094010 items=0 ppid=539 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.037000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:24:21.117870 kernel: FS-Cache: Loaded Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.157569 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.157655 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.157721 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.161260 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.161369 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.164994 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.165045 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.166869 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.170472 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.170536 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.174168 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.174249 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.177843 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.177913 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.181498 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.181547 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.185170 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.185230 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.188835 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.188896 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.192497 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.192560 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.196138 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.196201 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.199748 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.199852 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.203437 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.203485 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.207094 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.207141 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.210780 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.210864 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.214413 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.214472 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.218060 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.218121 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.221682 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.221731 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.225328 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.225387 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.228973 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.229091 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.232610 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.232693 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.236286 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.236335 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.239929 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.240001 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.243581 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.243630 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.247240 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.247310 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.250916 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.257577 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.257684 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.261197 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.261270 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.264783 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.264889 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.268400 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.268469 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.272052 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.272263 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.277425 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.277515 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.277563 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.281040 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.281128 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.282881 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.286452 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.286537 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.290047 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.290133 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.291869 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.295457 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.295544 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.299178 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.299251 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.302757 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.302858 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.306395 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.306464 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.309993 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.310071 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.313686 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.313770 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.317255 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.317346 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.320857 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.320942 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.324451 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.324532 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.326281 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.328161 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.329902 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.331753 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.333503 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.335369 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.338974 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.339025 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.340701 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.342579 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.344321 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.346181 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.347918 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.349779 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.351522 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.353373 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.355113 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.356970 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.360630 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.360726 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.362487 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.364229 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.366083 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.367809 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.369700 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.371441 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.373358 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.376927 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.377026 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.378772 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.382331 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.382425 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.385976 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.386025 kernel: Failed to create system directory sunrpc Apr 12 18:24:21.145000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.400012 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:24:21.400160 kernel: RPC: Registered udp transport module. Apr 12 18:24:21.400211 kernel: RPC: Registered tcp transport module. Apr 12 18:24:21.401628 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:24:21.145000 audit[4016]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae5302560 a1=14a344 a2=aaaaccb5e028 a3=aaaae5094010 items=6 ppid=539 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.145000 audit: CWD cwd="/" Apr 12 18:24:21.145000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:24:21.145000 audit: PATH item=1 name=(null) inode=21519 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:24:21.145000 audit: PATH item=2 name=(null) inode=21519 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:24:21.145000 audit: PATH item=3 name=(null) inode=21520 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:24:21.145000 audit: PATH item=4 name=(null) inode=21519 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:24:21.145000 audit: PATH item=5 name=(null) inode=21521 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:24:21.145000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.451579 kernel: Failed to create system directory nfs Apr 12 18:24:21.451667 kernel: Failed to create system directory nfs Apr 12 18:24:21.451729 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.455006 kernel: Failed to create system directory nfs Apr 12 18:24:21.455063 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.458452 kernel: Failed to create system directory nfs Apr 12 18:24:21.458563 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.461932 kernel: Failed to create system directory nfs Apr 12 18:24:21.461985 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.465371 kernel: Failed to create system directory nfs Apr 12 18:24:21.465422 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.468854 kernel: Failed to create system directory nfs Apr 12 18:24:21.468908 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.472326 kernel: Failed to create system directory nfs Apr 12 18:24:21.472422 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.475781 kernel: Failed to create system directory nfs Apr 12 18:24:21.475885 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.479262 kernel: Failed to create system directory nfs Apr 12 18:24:21.479372 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.482940 kernel: Failed to create system directory nfs Apr 12 18:24:21.483034 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.486381 kernel: Failed to create system directory nfs Apr 12 18:24:21.486430 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.488042 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.489845 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.493305 kernel: Failed to create system directory nfs Apr 12 18:24:21.493355 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.496759 kernel: Failed to create system directory nfs Apr 12 18:24:21.496807 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.500229 kernel: Failed to create system directory nfs Apr 12 18:24:21.500279 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.501896 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.510568 kernel: Failed to create system directory nfs Apr 12 18:24:21.510627 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.512200 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.513977 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.515610 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.517397 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.520940 kernel: Failed to create system directory nfs Apr 12 18:24:21.520992 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.524365 kernel: Failed to create system directory nfs Apr 12 18:24:21.524416 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.526147 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.529531 kernel: Failed to create system directory nfs Apr 12 18:24:21.529587 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.532948 kernel: Failed to create system directory nfs Apr 12 18:24:21.532999 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.534605 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.536395 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.539904 kernel: Failed to create system directory nfs Apr 12 18:24:21.539958 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.541525 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.543316 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.544970 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.546733 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.550199 kernel: Failed to create system directory nfs Apr 12 18:24:21.550252 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.551925 kernel: Failed to create system directory nfs Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.441000 audit[4016]: AVC avc: denied { confidentiality } for pid=4016 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.555317 kernel: Failed to create system directory nfs Apr 12 18:24:21.586965 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:24:21.441000 audit[4016]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae54ab4f0 a1=115814 a2=aaaaccb5e028 a3=aaaae5094010 items=0 ppid=539 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.441000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.636567 kubelet[2152]: E0412 18:24:21.635161 2152 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.636851 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.636909 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.642552 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.642611 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.644570 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.646519 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.648423 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.650413 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.652327 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.654281 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.656234 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.658180 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.660162 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.662147 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.664079 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.666006 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.667907 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.669916 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.671857 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.673739 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.677490 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.677544 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.679480 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.681455 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.683387 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.685270 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.687180 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.689066 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.691041 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.692963 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.694918 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.696815 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.698770 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.698849 kubelet[2152]: E0412 18:24:21.697999 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.701207 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.703098 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.705010 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.706902 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.708799 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.710859 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.712859 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.714788 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.716759 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.718703 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.722501 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.722551 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.724440 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.726321 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.728198 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.730147 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.732082 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.733982 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.735875 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.737878 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.737970 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.741442 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.741494 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.744953 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.745004 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.748472 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.748523 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.751988 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.752038 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.758039 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.758113 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.758154 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.761404 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.761474 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.764920 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.764974 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.768470 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.768534 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.771954 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.772004 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.773860 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.777527 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.779571 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.781453 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.781507 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.785017 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.785069 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.788534 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.788584 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.792090 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.792142 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.795604 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.795668 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.799985 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.800044 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.803507 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.803559 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.807013 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.807063 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.810560 kernel: Failed to create system directory nfs4 Apr 12 18:24:21.625000 audit[4021]: AVC avc: denied { confidentiality } for pid=4021 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:21.813030 kernel: Failed to create system directory nfs4 Apr 12 18:24:22.030406 kernel: NFS: Registering the id_resolver key type Apr 12 18:24:22.030528 kernel: Key type id_resolver registered Apr 12 18:24:22.030604 kernel: Key type id_legacy registered Apr 12 18:24:21.625000 audit[4021]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8bf7b010 a1=19c244 a2=aaaacfdde028 a3=aaaaee634010 items=0 ppid=539 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:21.625000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.053677 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.053752 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.055718 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.057724 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.059740 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.061766 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.063735 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.065713 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.067670 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.071623 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.071676 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.073642 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.075694 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.079635 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.079725 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.081732 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.083695 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.087622 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.087673 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.091585 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.091639 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.093617 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.095624 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.097627 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.099638 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.101639 kernel: Failed to create system directory rpcgss Apr 12 18:24:22.046000 audit[4022]: AVC avc: denied { confidentiality } for pid=4022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:24:22.046000 audit[4022]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff95ba3010 a1=5ef34 a2=aaaac4d9e028 a3=aaaae1034010 items=0 ppid=539 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.046000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:24:22.136268 nfsidmap[4028]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Apr 12 18:24:22.142167 nfsidmap[4029]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Apr 12 18:24:22.161000 audit[1880]: AVC avc: denied { watch_reads } for pid=1880 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:24:22.161000 audit[1880]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae7ce7210 a2=10 a3=0 items=0 ppid=1 pid=1880 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.161000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:24:22.161000 audit[1880]: AVC avc: denied { watch_reads } for pid=1880 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:24:22.161000 audit[1880]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae7ce7210 a2=10 a3=0 items=0 ppid=1 pid=1880 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.161000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:24:22.161000 audit[1880]: AVC avc: denied { watch_reads } for pid=1880 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:24:22.161000 audit[1880]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae7ce7210 a2=10 a3=0 items=0 ppid=1 pid=1880 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.161000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:24:22.162000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:24:22.162000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:24:22.162000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:24:22.275707 env[1688]: time="2024-04-12T18:24:22.274975847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:58b24771-1072-4df1-9e55-f49c725cfd71,Namespace:default,Attempt:0,}" Apr 12 18:24:22.486464 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:24:22.486879 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:24:22.483008 systemd-networkd[1492]: cali5ec59c6bf6e: Link UP Apr 12 18:24:22.486227 systemd-networkd[1492]: cali5ec59c6bf6e: Gained carrier Apr 12 18:24:22.487351 (udev-worker)[4017]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.357 [INFO][4031] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.129-k8s-test--pod--1-eth0 default 58b24771-1072-4df1-9e55-f49c725cfd71 1222 0 2024-04-12 18:23:48 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.129 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.358 [INFO][4031] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.405 [INFO][4041] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" HandleID="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Workload="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.424 [INFO][4041] ipam_plugin.go 268: Auto assigning IP ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" HandleID="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Workload="172.31.29.129-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000283a10), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.129", "pod":"test-pod-1", "timestamp":"2024-04-12 18:24:22.405595597 +0000 UTC"}, Hostname:"172.31.29.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.425 [INFO][4041] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.425 [INFO][4041] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.425 [INFO][4041] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.129' Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.428 [INFO][4041] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.437 [INFO][4041] ipam.go 372: Looking up existing affinities for host host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.445 [INFO][4041] ipam.go 489: Trying affinity for 192.168.70.0/26 host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.448 [INFO][4041] ipam.go 155: Attempting to load block cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.453 [INFO][4041] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.0/26 host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.453 [INFO][4041] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.0/26 handle="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.456 [INFO][4041] ipam.go 1682: Creating new handle: k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2 Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.462 [INFO][4041] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.0/26 handle="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.471 [INFO][4041] ipam.go 1216: Successfully claimed IPs: [192.168.70.5/26] block=192.168.70.0/26 handle="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.471 [INFO][4041] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.5/26] handle="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" host="172.31.29.129" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.471 [INFO][4041] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.471 [INFO][4041] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.5/26] IPv6=[] ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" HandleID="k8s-pod-network.9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Workload="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.474 [INFO][4031] k8s.go 385: Populated endpoint ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"58b24771-1072-4df1-9e55-f49c725cfd71", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:22.509858 env[1688]: 2024-04-12 18:24:22.475 [INFO][4031] k8s.go 386: Calico CNI using IPs: [192.168.70.5/32] ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.512214 env[1688]: 2024-04-12 18:24:22.475 [INFO][4031] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.512214 env[1688]: 2024-04-12 18:24:22.489 [INFO][4031] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.512214 env[1688]: 2024-04-12 18:24:22.490 [INFO][4031] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.129-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"58b24771-1072-4df1-9e55-f49c725cfd71", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.129", ContainerID:"9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e2:63:09:84:05:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:24:22.512214 env[1688]: 2024-04-12 18:24:22.501 [INFO][4031] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.129-k8s-test--pod--1-eth0" Apr 12 18:24:22.537000 audit[4059]: NETFILTER_CFG table=filter:91 family=2 entries=42 op=nft_register_chain pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:24:22.537000 audit[4059]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20588 a0=3 a1=ffffca390970 a2=0 a3=ffff86f36fa8 items=0 ppid=2804 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.537000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:24:22.541232 env[1688]: time="2024-04-12T18:24:22.541098908Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:24:22.541424 env[1688]: time="2024-04-12T18:24:22.541179656Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:24:22.541424 env[1688]: time="2024-04-12T18:24:22.541207064Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:24:22.542301 env[1688]: time="2024-04-12T18:24:22.542204359Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2 pid=4067 runtime=io.containerd.runc.v2 Apr 12 18:24:22.571251 systemd[1]: Started cri-containerd-9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2.scope. Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.605000 audit: BPF prog-id=128 op=LOAD Apr 12 18:24:22.607000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.607000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=4067 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663562396261373035356535633732663763653230623161616461 Apr 12 18:24:22.607000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.607000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4067 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663562396261373035356535633732663763653230623161616461 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.608000 audit: BPF prog-id=129 op=LOAD Apr 12 18:24:22.608000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4067 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663562396261373035356535633732663763653230623161616461 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.609000 audit: BPF prog-id=130 op=LOAD Apr 12 18:24:22.609000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4067 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663562396261373035356535633732663763653230623161616461 Apr 12 18:24:22.611000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:24:22.611000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:22.611000 audit: BPF prog-id=131 op=LOAD Apr 12 18:24:22.611000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4067 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:22.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961663562396261373035356535633732663763653230623161616461 Apr 12 18:24:22.657034 env[1688]: time="2024-04-12T18:24:22.656970941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:58b24771-1072-4df1-9e55-f49c725cfd71,Namespace:default,Attempt:0,} returns sandbox id \"9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2\"" Apr 12 18:24:22.660153 env[1688]: time="2024-04-12T18:24:22.659591270Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:24:22.699193 kubelet[2152]: E0412 18:24:22.699062 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:22.998881 env[1688]: time="2024-04-12T18:24:22.998795916Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:23.003043 env[1688]: time="2024-04-12T18:24:23.002976298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:23.007135 env[1688]: time="2024-04-12T18:24:23.007072410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:23.010308 env[1688]: time="2024-04-12T18:24:23.010245695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:24:23.011745 env[1688]: time="2024-04-12T18:24:23.011698041Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:24:23.015387 env[1688]: time="2024-04-12T18:24:23.015327958Z" level=info msg="CreateContainer within sandbox \"9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:24:23.042033 env[1688]: time="2024-04-12T18:24:23.041948847Z" level=info msg="CreateContainer within sandbox \"9af5b9ba7055e5c72f7ce20b1aada357fc2d235bbaecf41a85b9e311fd11c3b2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"63335fa681e37a3165bfee2a7ee730d0e2680e37ce731ff31e8748668e78c8e8\"" Apr 12 18:24:23.043090 env[1688]: time="2024-04-12T18:24:23.043031009Z" level=info msg="StartContainer for \"63335fa681e37a3165bfee2a7ee730d0e2680e37ce731ff31e8748668e78c8e8\"" Apr 12 18:24:23.073030 systemd[1]: Started cri-containerd-63335fa681e37a3165bfee2a7ee730d0e2680e37ce731ff31e8748668e78c8e8.scope. Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.102000 audit: BPF prog-id=132 op=LOAD Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4067 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333335666136383165333761333136356266656532613765653733 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4067 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333335666136383165333761333136356266656532613765653733 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit: BPF prog-id=133 op=LOAD Apr 12 18:24:23.103000 audit[4106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4067 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333335666136383165333761333136356266656532613765653733 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit: BPF prog-id=134 op=LOAD Apr 12 18:24:23.103000 audit[4106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4067 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333335666136383165333761333136356266656532613765653733 Apr 12 18:24:23.103000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:24:23.103000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:24:23.103000 audit: BPF prog-id=135 op=LOAD Apr 12 18:24:23.103000 audit[4106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4067 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:24:23.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333335666136383165333761333136356266656532613765653733 Apr 12 18:24:23.142357 env[1688]: time="2024-04-12T18:24:23.140959538Z" level=info msg="StartContainer for \"63335fa681e37a3165bfee2a7ee730d0e2680e37ce731ff31e8748668e78c8e8\" returns successfully" Apr 12 18:24:23.699954 kubelet[2152]: E0412 18:24:23.699892 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:23.832065 systemd-networkd[1492]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:24:24.700111 kubelet[2152]: E0412 18:24:24.700055 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:25.701217 kubelet[2152]: E0412 18:24:25.701155 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:26.702215 kubelet[2152]: E0412 18:24:26.702172 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:27.703926 kubelet[2152]: E0412 18:24:27.703882 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:28.704962 kubelet[2152]: E0412 18:24:28.704920 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:29.706023 kubelet[2152]: E0412 18:24:29.705980 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:30.707157 kubelet[2152]: E0412 18:24:30.707083 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:31.707977 kubelet[2152]: E0412 18:24:31.707942 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:32.709377 kubelet[2152]: E0412 18:24:32.709310 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:33.710555 kubelet[2152]: E0412 18:24:33.710492 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:34.710700 kubelet[2152]: E0412 18:24:34.710633 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:35.711441 kubelet[2152]: E0412 18:24:35.711403 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:36.712161 kubelet[2152]: E0412 18:24:36.712123 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:37.713831 kubelet[2152]: E0412 18:24:37.713764 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:38.714553 kubelet[2152]: E0412 18:24:38.714499 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:39.716048 kubelet[2152]: E0412 18:24:39.715995 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:40.717421 kubelet[2152]: E0412 18:24:40.717342 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:41.384156 systemd[1]: run-containerd-runc-k8s.io-ff06bef4640dbe74296ec1b185a5bc541a15ad15214f82515d1c57d018c09afd-runc.BwiMqV.mount: Deactivated successfully. Apr 12 18:24:41.635370 kubelet[2152]: E0412 18:24:41.635248 2152 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:41.718836 kubelet[2152]: E0412 18:24:41.718775 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:42.719248 kubelet[2152]: E0412 18:24:42.719181 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:43.719610 kubelet[2152]: E0412 18:24:43.719558 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:44.223160 systemd[1]: run-containerd-runc-k8s.io-196dfddc8ac47555a5e16c0854d15d6277f0f0880d1c7963e6814c51d70f5535-runc.2pftft.mount: Deactivated successfully. Apr 12 18:24:44.719782 kubelet[2152]: E0412 18:24:44.719714 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:44.906301 kubelet[2152]: E0412 18:24:44.906223 2152 controller.go:193] "Failed to update lease" err="Put \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:24:45.720560 kubelet[2152]: E0412 18:24:45.720518 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:46.722129 kubelet[2152]: E0412 18:24:46.722089 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:47.723092 kubelet[2152]: E0412 18:24:47.723029 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:48.723300 kubelet[2152]: E0412 18:24:48.723236 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:49.724195 kubelet[2152]: E0412 18:24:49.724156 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:50.044000 audit[3746]: AVC avc: denied { watch } for pid=3746 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_23_44.794399512/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c905 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c675,c905 tclass=file permissive=0 Apr 12 18:24:50.047405 kernel: kauditd_printk_skb: 461 callbacks suppressed Apr 12 18:24:50.047519 kernel: audit: type=1400 audit(1712946290.044:971): avc: denied { watch } for pid=3746 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_23_44.794399512/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c905 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c675,c905 tclass=file permissive=0 Apr 12 18:24:50.044000 audit[3746]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001124820 a2=fc6 a3=0 items=0 ppid=3596 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c905 key=(null) Apr 12 18:24:50.069357 kernel: audit: type=1300 audit(1712946290.044:971): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001124820 a2=fc6 a3=0 items=0 ppid=3596 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c905 key=(null) Apr 12 18:24:50.069487 kernel: audit: type=1327 audit(1712946290.044:971): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:24:50.044000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:24:50.725220 kubelet[2152]: E0412 18:24:50.725183 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:51.726177 kubelet[2152]: E0412 18:24:51.726107 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:52.726623 kubelet[2152]: E0412 18:24:52.726556 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:53.727338 kubelet[2152]: E0412 18:24:53.727296 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:54.729034 kubelet[2152]: E0412 18:24:54.728969 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:54.907542 kubelet[2152]: E0412 18:24:54.907495 2152 controller.go:193] "Failed to update lease" err="Put \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:24:55.729574 kubelet[2152]: E0412 18:24:55.729513 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:56.730637 kubelet[2152]: E0412 18:24:56.730566 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:57.731567 kubelet[2152]: E0412 18:24:57.731501 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:58.732456 kubelet[2152]: E0412 18:24:58.732391 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:59.242205 kubelet[2152]: E0412 18:24:59.242138 2152 controller.go:193] "Failed to update lease" err="Put \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": unexpected EOF" Apr 12 18:24:59.243339 kubelet[2152]: E0412 18:24:59.243263 2152 controller.go:193] "Failed to update lease" err="Put \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" Apr 12 18:24:59.243885 kubelet[2152]: E0412 18:24:59.243842 2152 controller.go:193] "Failed to update lease" err="Put \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" Apr 12 18:24:59.244209 kubelet[2152]: I0412 18:24:59.244170 2152 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Apr 12 18:24:59.245195 kubelet[2152]: E0412 18:24:59.245084 2152 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="200ms" Apr 12 18:24:59.446436 kubelet[2152]: E0412 18:24:59.446397 2152 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="400ms" Apr 12 18:24:59.733318 kubelet[2152]: E0412 18:24:59.733280 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:24:59.847920 kubelet[2152]: E0412 18:24:59.847885 2152 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.20.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.129?timeout=10s\": dial tcp 172.31.20.40:6443: connect: connection refused" interval="800ms" Apr 12 18:25:00.734895 kubelet[2152]: E0412 18:25:00.734855 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:25:01.635230 kubelet[2152]: E0412 18:25:01.635169 2152 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:25:01.736230 kubelet[2152]: E0412 18:25:01.736168 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:25:02.736843 kubelet[2152]: E0412 18:25:02.736761 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:25:03.737620 kubelet[2152]: E0412 18:25:03.737577 2152 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"