Dec 13 02:22:04.000199 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:22:04.000249 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:22:04.000292 kernel: BIOS-provided physical RAM map: Dec 13 02:22:04.000300 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 02:22:04.000306 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 02:22:04.000312 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 02:22:04.000323 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 02:22:04.000329 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 02:22:04.000336 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 02:22:04.000342 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 02:22:04.000348 kernel: NX (Execute Disable) protection: active Dec 13 02:22:04.000355 kernel: SMBIOS 2.7 present. Dec 13 02:22:04.000601 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 02:22:04.000616 kernel: Hypervisor detected: KVM Dec 13 02:22:04.000629 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:22:04.000636 kernel: kvm-clock: cpu 0, msr 1419b001, primary cpu clock Dec 13 02:22:04.000643 kernel: kvm-clock: using sched offset of 7454200162 cycles Dec 13 02:22:04.000651 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:22:04.000658 kernel: tsc: Detected 2499.996 MHz processor Dec 13 02:22:04.000665 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:22:04.000675 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:22:04.000682 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 02:22:04.000689 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:22:04.000696 kernel: Using GB pages for direct mapping Dec 13 02:22:04.000703 kernel: ACPI: Early table checksum verification disabled Dec 13 02:22:04.000710 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 02:22:04.000718 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 02:22:04.000725 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 02:22:04.000732 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 02:22:04.000741 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 02:22:04.000748 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 02:22:04.000754 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 02:22:04.000762 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 02:22:04.000768 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 02:22:04.000775 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 02:22:04.000782 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 02:22:04.000789 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 02:22:04.000798 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 02:22:04.000805 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 02:22:04.000812 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 02:22:04.000822 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 02:22:04.000829 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 02:22:04.000837 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 02:22:04.000844 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 02:22:04.000854 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 02:22:04.000861 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 02:22:04.000868 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 02:22:04.000876 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:22:04.000883 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:22:04.000890 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 02:22:04.000898 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 02:22:04.000905 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 02:22:04.000914 kernel: Zone ranges: Dec 13 02:22:04.000922 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:22:04.000929 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 02:22:04.000936 kernel: Normal empty Dec 13 02:22:04.000944 kernel: Movable zone start for each node Dec 13 02:22:04.000951 kernel: Early memory node ranges Dec 13 02:22:04.000958 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 02:22:04.000966 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 02:22:04.000973 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 02:22:04.000983 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:22:04.000990 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 02:22:04.000997 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 02:22:04.001005 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:22:04.001012 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:22:04.001020 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 02:22:04.001027 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:22:04.001035 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:22:04.001042 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:22:04.001052 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:22:04.001059 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:22:04.001067 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 02:22:04.001074 kernel: TSC deadline timer available Dec 13 02:22:04.001082 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:22:04.001097 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 02:22:04.001105 kernel: Booting paravirtualized kernel on KVM Dec 13 02:22:04.001113 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:22:04.001120 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:22:04.001130 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:22:04.001137 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:22:04.001144 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:22:04.001152 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 02:22:04.001159 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:22:04.001167 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:22:04.001174 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 02:22:04.001182 kernel: Policy zone: DMA32 Dec 13 02:22:04.001190 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:22:04.001200 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:22:04.001207 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:22:04.001215 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:22:04.001235 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:22:04.001243 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 123080K reserved, 0K cma-reserved) Dec 13 02:22:04.001251 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:22:04.001258 kernel: Kernel/User page tables isolation: enabled Dec 13 02:22:04.001266 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:22:04.001276 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:22:04.001283 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:22:04.001291 kernel: rcu: RCU event tracing is enabled. Dec 13 02:22:04.001299 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:22:04.001307 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:22:04.001315 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:22:04.001323 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:22:04.001330 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:22:04.001338 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:22:04.001347 kernel: random: crng init done Dec 13 02:22:04.001354 kernel: Console: colour VGA+ 80x25 Dec 13 02:22:04.001362 kernel: printk: console [ttyS0] enabled Dec 13 02:22:04.001369 kernel: ACPI: Core revision 20210730 Dec 13 02:22:04.001377 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 02:22:04.001385 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:22:04.001392 kernel: x2apic enabled Dec 13 02:22:04.001400 kernel: Switched APIC routing to physical x2apic. Dec 13 02:22:04.001408 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 02:22:04.001417 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Dec 13 02:22:04.001425 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:22:04.001433 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:22:04.001440 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:22:04.001455 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 02:22:04.001467 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:22:04.001528 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:22:04.001536 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 02:22:04.001544 kernel: RETBleed: Vulnerable Dec 13 02:22:04.001552 kernel: Speculative Store Bypass: Vulnerable Dec 13 02:22:04.001560 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:22:04.001567 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:22:04.001575 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 02:22:04.001583 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:22:04.001594 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:22:04.001602 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:22:04.001610 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 02:22:04.001618 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 02:22:04.001625 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 02:22:04.001635 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 02:22:04.001643 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 02:22:04.001651 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 02:22:04.001704 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:22:04.001715 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 02:22:04.001724 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 02:22:04.001732 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 02:22:04.001740 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 02:22:04.001748 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 02:22:04.001756 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 02:22:04.001764 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 02:22:04.001772 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:22:04.001783 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:22:04.001791 kernel: LSM: Security Framework initializing Dec 13 02:22:04.001799 kernel: SELinux: Initializing. Dec 13 02:22:04.001806 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:22:04.001814 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:22:04.001822 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 02:22:04.001830 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 02:22:04.001838 kernel: signal: max sigframe size: 3632 Dec 13 02:22:04.001846 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:22:04.001854 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:22:04.001865 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:22:04.001873 kernel: x86: Booting SMP configuration: Dec 13 02:22:04.001880 kernel: .... node #0, CPUs: #1 Dec 13 02:22:04.001888 kernel: kvm-clock: cpu 1, msr 1419b041, secondary cpu clock Dec 13 02:22:04.001896 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 02:22:04.001905 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:22:04.001913 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:22:04.001921 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:22:04.001929 kernel: smpboot: Max logical packages: 1 Dec 13 02:22:04.001939 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Dec 13 02:22:04.001947 kernel: devtmpfs: initialized Dec 13 02:22:04.001955 kernel: x86/mm: Memory block size: 128MB Dec 13 02:22:04.001963 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:22:04.001971 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:22:04.001979 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:22:04.001987 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:22:04.001995 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:22:04.002003 kernel: audit: type=2000 audit(1734056523.393:1): state=initialized audit_enabled=0 res=1 Dec 13 02:22:04.002013 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:22:04.002021 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:22:04.002029 kernel: cpuidle: using governor menu Dec 13 02:22:04.002036 kernel: ACPI: bus type PCI registered Dec 13 02:22:04.002045 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:22:04.002052 kernel: dca service started, version 1.12.1 Dec 13 02:22:04.002060 kernel: PCI: Using configuration type 1 for base access Dec 13 02:22:04.002108 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:22:04.002118 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:22:04.002128 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:22:04.002136 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:22:04.002144 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:22:04.002152 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:22:04.002160 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:22:04.002207 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:22:04.002216 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:22:04.003543 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:22:04.003563 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:22:04.003576 kernel: ACPI: Interpreter enabled Dec 13 02:22:04.003584 kernel: ACPI: PM: (supports S0 S5) Dec 13 02:22:04.003593 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:22:04.003601 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:22:04.003609 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:22:04.003617 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:22:04.003764 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:22:04.003849 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:22:04.003863 kernel: acpiphp: Slot [3] registered Dec 13 02:22:04.003871 kernel: acpiphp: Slot [4] registered Dec 13 02:22:04.016358 kernel: acpiphp: Slot [5] registered Dec 13 02:22:04.016471 kernel: acpiphp: Slot [6] registered Dec 13 02:22:04.016524 kernel: acpiphp: Slot [7] registered Dec 13 02:22:04.016539 kernel: acpiphp: Slot [8] registered Dec 13 02:22:04.016553 kernel: acpiphp: Slot [9] registered Dec 13 02:22:04.016601 kernel: acpiphp: Slot [10] registered Dec 13 02:22:04.016618 kernel: acpiphp: Slot [11] registered Dec 13 02:22:04.016640 kernel: acpiphp: Slot [12] registered Dec 13 02:22:04.016688 kernel: acpiphp: Slot [13] registered Dec 13 02:22:04.016704 kernel: acpiphp: Slot [14] registered Dec 13 02:22:04.016719 kernel: acpiphp: Slot [15] registered Dec 13 02:22:04.016763 kernel: acpiphp: Slot [16] registered Dec 13 02:22:04.016782 kernel: acpiphp: Slot [17] registered Dec 13 02:22:04.016797 kernel: acpiphp: Slot [18] registered Dec 13 02:22:04.016812 kernel: acpiphp: Slot [19] registered Dec 13 02:22:04.016858 kernel: acpiphp: Slot [20] registered Dec 13 02:22:04.016878 kernel: acpiphp: Slot [21] registered Dec 13 02:22:04.016893 kernel: acpiphp: Slot [22] registered Dec 13 02:22:04.016940 kernel: acpiphp: Slot [23] registered Dec 13 02:22:04.016958 kernel: acpiphp: Slot [24] registered Dec 13 02:22:04.016972 kernel: acpiphp: Slot [25] registered Dec 13 02:22:04.016987 kernel: acpiphp: Slot [26] registered Dec 13 02:22:04.017038 kernel: acpiphp: Slot [27] registered Dec 13 02:22:04.017054 kernel: acpiphp: Slot [28] registered Dec 13 02:22:04.017069 kernel: acpiphp: Slot [29] registered Dec 13 02:22:04.017123 kernel: acpiphp: Slot [30] registered Dec 13 02:22:04.017142 kernel: acpiphp: Slot [31] registered Dec 13 02:22:04.017157 kernel: PCI host bridge to bus 0000:00 Dec 13 02:22:04.032448 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:22:04.032598 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:22:04.032773 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:22:04.032893 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 02:22:04.033006 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:22:04.033168 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:22:04.033626 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 02:22:04.033780 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 02:22:04.033913 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:22:04.034088 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 02:22:04.034219 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 02:22:04.037529 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 02:22:04.037677 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 02:22:04.038020 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 02:22:04.040316 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 02:22:04.040568 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 02:22:04.040716 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 02:22:04.041293 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 02:22:04.041490 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 02:22:04.041923 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:22:04.045407 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 02:22:04.045555 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 02:22:04.045691 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 02:22:04.045819 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 02:22:04.045840 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:22:04.045863 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:22:04.045878 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:22:04.045893 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:22:04.045908 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:22:04.045923 kernel: iommu: Default domain type: Translated Dec 13 02:22:04.045938 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:22:04.046063 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 02:22:04.046188 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:22:04.046325 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 02:22:04.046349 kernel: vgaarb: loaded Dec 13 02:22:04.046364 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:22:04.046436 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:22:04.046455 kernel: PTP clock support registered Dec 13 02:22:04.046470 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:22:04.046483 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:22:04.046497 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 02:22:04.046512 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 02:22:04.046530 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 02:22:04.046545 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 02:22:04.046560 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:22:04.046575 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:22:04.046590 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:22:04.046604 kernel: pnp: PnP ACPI init Dec 13 02:22:04.046619 kernel: pnp: PnP ACPI: found 5 devices Dec 13 02:22:04.046634 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:22:04.046649 kernel: NET: Registered PF_INET protocol family Dec 13 02:22:04.046666 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:22:04.046682 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 02:22:04.046698 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:22:04.046713 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:22:04.046727 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:22:04.046742 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 02:22:04.046757 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:22:04.046772 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:22:04.046786 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:22:04.046804 kernel: NET: Registered PF_XDP protocol family Dec 13 02:22:04.046936 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:22:04.047051 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:22:04.047207 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:22:04.055438 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 02:22:04.055599 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:22:04.055728 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 02:22:04.055756 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:22:04.055771 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:22:04.055786 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 02:22:04.055801 kernel: clocksource: Switched to clocksource tsc Dec 13 02:22:04.055815 kernel: Initialise system trusted keyrings Dec 13 02:22:04.055830 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 02:22:04.055844 kernel: Key type asymmetric registered Dec 13 02:22:04.055858 kernel: Asymmetric key parser 'x509' registered Dec 13 02:22:04.055872 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:22:04.055956 kernel: io scheduler mq-deadline registered Dec 13 02:22:04.055971 kernel: io scheduler kyber registered Dec 13 02:22:04.055986 kernel: io scheduler bfq registered Dec 13 02:22:04.056000 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:22:04.056015 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:22:04.056029 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:22:04.056044 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:22:04.056058 kernel: i8042: Warning: Keylock active Dec 13 02:22:04.056072 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:22:04.056089 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:22:04.056249 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:22:04.056369 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:22:04.056483 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:22:03 UTC (1734056523) Dec 13 02:22:04.056595 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:22:04.056612 kernel: intel_pstate: CPU model not supported Dec 13 02:22:04.056627 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:22:04.056641 kernel: Segment Routing with IPv6 Dec 13 02:22:04.056659 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:22:04.056673 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:22:04.056687 kernel: Key type dns_resolver registered Dec 13 02:22:04.056701 kernel: IPI shorthand broadcast: enabled Dec 13 02:22:04.056716 kernel: sched_clock: Marking stable (386209407, 247985496)->(738057205, -103862302) Dec 13 02:22:04.056730 kernel: registered taskstats version 1 Dec 13 02:22:04.056744 kernel: Loading compiled-in X.509 certificates Dec 13 02:22:04.056758 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:22:04.056772 kernel: Key type .fscrypt registered Dec 13 02:22:04.056789 kernel: Key type fscrypt-provisioning registered Dec 13 02:22:04.056803 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:22:04.056817 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:22:04.056832 kernel: ima: No architecture policies found Dec 13 02:22:04.056847 kernel: clk: Disabling unused clocks Dec 13 02:22:04.056861 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:22:04.056876 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:22:04.056890 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:22:04.056904 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:22:04.056921 kernel: Run /init as init process Dec 13 02:22:04.056935 kernel: with arguments: Dec 13 02:22:04.056950 kernel: /init Dec 13 02:22:04.056964 kernel: with environment: Dec 13 02:22:04.056977 kernel: HOME=/ Dec 13 02:22:04.056991 kernel: TERM=linux Dec 13 02:22:04.057005 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:22:04.057024 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:22:04.057044 systemd[1]: Detected virtualization amazon. Dec 13 02:22:04.057059 systemd[1]: Detected architecture x86-64. Dec 13 02:22:04.057074 systemd[1]: Running in initrd. Dec 13 02:22:04.057096 systemd[1]: No hostname configured, using default hostname. Dec 13 02:22:04.057125 systemd[1]: Hostname set to . Dec 13 02:22:04.057146 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:22:04.057162 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:22:04.057178 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:22:04.057193 systemd[1]: Reached target cryptsetup.target. Dec 13 02:22:04.057208 systemd[1]: Reached target paths.target. Dec 13 02:22:04.057234 systemd[1]: Reached target slices.target. Dec 13 02:22:04.057248 systemd[1]: Reached target swap.target. Dec 13 02:22:04.057260 systemd[1]: Reached target timers.target. Dec 13 02:22:04.057279 systemd[1]: Listening on iscsid.socket. Dec 13 02:22:04.057294 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:22:04.057309 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:22:04.057325 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:22:04.057340 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:22:04.057355 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:22:04.057373 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:22:04.057388 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:22:04.057403 systemd[1]: Reached target sockets.target. Dec 13 02:22:04.057420 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:22:04.057435 systemd[1]: Finished network-cleanup.service. Dec 13 02:22:04.057450 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:22:04.057465 systemd[1]: Starting systemd-journald.service... Dec 13 02:22:04.057479 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:22:04.057494 systemd[1]: Starting systemd-resolved.service... Dec 13 02:22:04.057509 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:22:04.057584 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:22:04.057608 systemd-journald[185]: Journal started Dec 13 02:22:04.057685 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2281aeaf95129bf25ff9042ade9668) is 4.8M, max 38.7M, 33.9M free. Dec 13 02:22:04.007400 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 02:22:04.231271 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:22:04.231313 kernel: Bridge firewalling registered Dec 13 02:22:04.231333 kernel: SCSI subsystem initialized Dec 13 02:22:04.231348 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:22:04.231365 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:22:04.231385 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:22:04.231404 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:22:04.231420 systemd[1]: Started systemd-journald.service. Dec 13 02:22:04.231443 kernel: audit: type=1130 audit(1734056524.221:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.073567 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 02:22:04.125328 systemd-resolved[187]: Positive Trust Anchors: Dec 13 02:22:04.125343 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:22:04.243341 kernel: audit: type=1130 audit(1734056524.235:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.125398 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:22:04.255548 kernel: audit: type=1130 audit(1734056524.243:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.129940 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 02:22:04.260765 kernel: audit: type=1130 audit(1734056524.255:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.135281 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 02:22:04.243465 systemd[1]: Started systemd-resolved.service. Dec 13 02:22:04.268606 kernel: audit: type=1130 audit(1734056524.261:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.244818 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:22:04.274041 kernel: audit: type=1130 audit(1734056524.267:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.262010 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:22:04.263567 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:22:04.268945 systemd[1]: Reached target nss-lookup.target. Dec 13 02:22:04.275382 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:22:04.280166 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:22:04.281037 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:22:04.291895 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:22:04.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.296237 kernel: audit: type=1130 audit(1734056524.290:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.298127 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:22:04.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.302237 kernel: audit: type=1130 audit(1734056524.296:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.314108 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:22:04.316076 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:22:04.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.323244 kernel: audit: type=1130 audit(1734056524.314:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.327661 dracut-cmdline[208]: dracut-dracut-053 Dec 13 02:22:04.330940 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:22:04.437301 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:22:04.460893 kernel: iscsi: registered transport (tcp) Dec 13 02:22:04.490746 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:22:04.490823 kernel: QLogic iSCSI HBA Driver Dec 13 02:22:04.533461 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:22:04.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:04.536035 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:22:04.620437 kernel: raid6: avx512x4 gen() 13565 MB/s Dec 13 02:22:04.638279 kernel: raid6: avx512x4 xor() 5642 MB/s Dec 13 02:22:04.663323 kernel: raid6: avx512x2 gen() 13379 MB/s Dec 13 02:22:04.680281 kernel: raid6: avx512x2 xor() 12840 MB/s Dec 13 02:22:04.698270 kernel: raid6: avx512x1 gen() 13281 MB/s Dec 13 02:22:04.718271 kernel: raid6: avx512x1 xor() 12968 MB/s Dec 13 02:22:04.735274 kernel: raid6: avx2x4 gen() 14053 MB/s Dec 13 02:22:04.752266 kernel: raid6: avx2x4 xor() 5370 MB/s Dec 13 02:22:04.769310 kernel: raid6: avx2x2 gen() 12994 MB/s Dec 13 02:22:04.786347 kernel: raid6: avx2x2 xor() 9000 MB/s Dec 13 02:22:04.803283 kernel: raid6: avx2x1 gen() 8843 MB/s Dec 13 02:22:04.821312 kernel: raid6: avx2x1 xor() 11236 MB/s Dec 13 02:22:04.840414 kernel: raid6: sse2x4 gen() 7432 MB/s Dec 13 02:22:04.858265 kernel: raid6: sse2x4 xor() 4000 MB/s Dec 13 02:22:04.876279 kernel: raid6: sse2x2 gen() 8200 MB/s Dec 13 02:22:04.893314 kernel: raid6: sse2x2 xor() 4293 MB/s Dec 13 02:22:04.910279 kernel: raid6: sse2x1 gen() 7557 MB/s Dec 13 02:22:04.927981 kernel: raid6: sse2x1 xor() 3708 MB/s Dec 13 02:22:04.928059 kernel: raid6: using algorithm avx2x4 gen() 14053 MB/s Dec 13 02:22:04.928077 kernel: raid6: .... xor() 5370 MB/s, rmw enabled Dec 13 02:22:04.928867 kernel: raid6: using avx512x2 recovery algorithm Dec 13 02:22:04.950263 kernel: xor: automatically using best checksumming function avx Dec 13 02:22:05.101252 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:22:05.112345 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:22:05.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:05.116000 audit: BPF prog-id=7 op=LOAD Dec 13 02:22:05.116000 audit: BPF prog-id=8 op=LOAD Dec 13 02:22:05.118036 systemd[1]: Starting systemd-udevd.service... Dec 13 02:22:05.139659 systemd-udevd[385]: Using default interface naming scheme 'v252'. Dec 13 02:22:05.146710 systemd[1]: Started systemd-udevd.service. Dec 13 02:22:05.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:05.149289 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:22:05.173699 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Dec 13 02:22:05.214833 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:22:05.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:05.217821 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:22:05.276890 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:22:05.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:05.374245 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:22:05.385267 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 02:22:05.411319 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 02:22:05.411482 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:22:05.411500 kernel: AES CTR mode by8 optimization enabled Dec 13 02:22:05.411516 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 02:22:05.411646 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:31:95:70:14:63 Dec 13 02:22:05.413934 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:22:05.571314 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 02:22:05.571601 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 02:22:05.571634 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 02:22:05.571801 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:22:05.571820 kernel: GPT:9289727 != 16777215 Dec 13 02:22:05.571837 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:22:05.571855 kernel: GPT:9289727 != 16777215 Dec 13 02:22:05.571873 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:22:05.571890 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:22:05.596247 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (431) Dec 13 02:22:05.601306 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:22:05.665609 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:22:05.671880 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:22:05.674029 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:22:05.681158 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:22:05.683376 systemd[1]: Starting disk-uuid.service... Dec 13 02:22:05.690308 disk-uuid[590]: Primary Header is updated. Dec 13 02:22:05.690308 disk-uuid[590]: Secondary Entries is updated. Dec 13 02:22:05.690308 disk-uuid[590]: Secondary Header is updated. Dec 13 02:22:05.696242 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:22:05.702249 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:22:05.708248 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:22:06.711500 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:22:06.712035 disk-uuid[591]: The operation has completed successfully. Dec 13 02:22:06.859736 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:22:06.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:06.859854 systemd[1]: Finished disk-uuid.service. Dec 13 02:22:06.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:06.872567 systemd[1]: Starting verity-setup.service... Dec 13 02:22:06.891987 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:22:07.019696 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:22:07.025244 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:22:07.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.031300 systemd[1]: Finished verity-setup.service. Dec 13 02:22:07.132251 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:22:07.132241 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:22:07.133864 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:22:07.136786 systemd[1]: Starting ignition-setup.service... Dec 13 02:22:07.140062 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:22:07.168742 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:22:07.168804 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 02:22:07.168823 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 02:22:07.181354 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 02:22:07.196842 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:22:07.226640 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:22:07.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.228000 audit: BPF prog-id=9 op=LOAD Dec 13 02:22:07.230490 systemd[1]: Starting systemd-networkd.service... Dec 13 02:22:07.253687 systemd[1]: Finished ignition-setup.service. Dec 13 02:22:07.256188 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:22:07.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.261371 systemd-networkd[1101]: lo: Link UP Dec 13 02:22:07.261381 systemd-networkd[1101]: lo: Gained carrier Dec 13 02:22:07.263505 systemd-networkd[1101]: Enumeration completed Dec 13 02:22:07.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.263590 systemd[1]: Started systemd-networkd.service. Dec 13 02:22:07.264623 systemd[1]: Reached target network.target. Dec 13 02:22:07.265399 systemd-networkd[1101]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:22:07.271623 systemd[1]: Starting iscsiuio.service... Dec 13 02:22:07.275481 systemd-networkd[1101]: eth0: Link UP Dec 13 02:22:07.275562 systemd-networkd[1101]: eth0: Gained carrier Dec 13 02:22:07.277540 systemd[1]: Started iscsiuio.service. Dec 13 02:22:07.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.280418 systemd[1]: Starting iscsid.service... Dec 13 02:22:07.284948 iscsid[1108]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:22:07.284948 iscsid[1108]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:22:07.284948 iscsid[1108]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:22:07.284948 iscsid[1108]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:22:07.295338 iscsid[1108]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:22:07.295338 iscsid[1108]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:22:07.299289 systemd[1]: Started iscsid.service. Dec 13 02:22:07.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.302063 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:22:07.306336 systemd-networkd[1101]: eth0: DHCPv4 address 172.31.21.209/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 02:22:07.318995 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:22:07.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:07.320237 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:22:07.320303 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:22:07.323127 systemd[1]: Reached target remote-fs.target. Dec 13 02:22:07.326176 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:22:07.336066 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:22:07.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.017788 ignition[1104]: Ignition 2.14.0 Dec 13 02:22:08.017803 ignition[1104]: Stage: fetch-offline Dec 13 02:22:08.017946 ignition[1104]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:08.017987 ignition[1104]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:08.033586 ignition[1104]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:08.035157 ignition[1104]: Ignition finished successfully Dec 13 02:22:08.036944 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:22:08.039512 systemd[1]: Starting ignition-fetch.service... Dec 13 02:22:08.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.049594 ignition[1127]: Ignition 2.14.0 Dec 13 02:22:08.049608 ignition[1127]: Stage: fetch Dec 13 02:22:08.049815 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:08.049849 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:08.060098 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:08.061723 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:08.070581 ignition[1127]: INFO : PUT result: OK Dec 13 02:22:08.073146 ignition[1127]: DEBUG : parsed url from cmdline: "" Dec 13 02:22:08.073146 ignition[1127]: INFO : no config URL provided Dec 13 02:22:08.073146 ignition[1127]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:22:08.073146 ignition[1127]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 02:22:08.077951 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:08.077951 ignition[1127]: INFO : PUT result: OK Dec 13 02:22:08.077951 ignition[1127]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 02:22:08.085596 ignition[1127]: INFO : GET result: OK Dec 13 02:22:08.087373 ignition[1127]: DEBUG : parsing config with SHA512: fea77581324c8ebbd472ac0ab0e7098341f45d9298aa89e4f41ec648ad49b9f222aaf41a54d05242b63e3cecbf69def8ed29ed1b652e208c14e512d5545d33a3 Dec 13 02:22:08.101373 unknown[1127]: fetched base config from "system" Dec 13 02:22:08.101699 unknown[1127]: fetched base config from "system" Dec 13 02:22:08.101708 unknown[1127]: fetched user config from "aws" Dec 13 02:22:08.108119 ignition[1127]: fetch: fetch complete Dec 13 02:22:08.108128 ignition[1127]: fetch: fetch passed Dec 13 02:22:08.108196 ignition[1127]: Ignition finished successfully Dec 13 02:22:08.119742 systemd[1]: Finished ignition-fetch.service. Dec 13 02:22:08.120933 systemd[1]: Starting ignition-kargs.service... Dec 13 02:22:08.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.132042 ignition[1133]: Ignition 2.14.0 Dec 13 02:22:08.132056 ignition[1133]: Stage: kargs Dec 13 02:22:08.132349 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:08.132382 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:08.142758 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:08.144160 ignition[1133]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:08.146084 ignition[1133]: INFO : PUT result: OK Dec 13 02:22:08.148765 ignition[1133]: kargs: kargs passed Dec 13 02:22:08.148827 ignition[1133]: Ignition finished successfully Dec 13 02:22:08.151514 systemd[1]: Finished ignition-kargs.service. Dec 13 02:22:08.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.152675 systemd[1]: Starting ignition-disks.service... Dec 13 02:22:08.162545 ignition[1139]: Ignition 2.14.0 Dec 13 02:22:08.162559 ignition[1139]: Stage: disks Dec 13 02:22:08.162758 ignition[1139]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:08.162790 ignition[1139]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:08.172315 ignition[1139]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:08.173814 ignition[1139]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:08.175386 ignition[1139]: INFO : PUT result: OK Dec 13 02:22:08.178175 ignition[1139]: disks: disks passed Dec 13 02:22:08.178237 ignition[1139]: Ignition finished successfully Dec 13 02:22:08.180908 systemd[1]: Finished ignition-disks.service. Dec 13 02:22:08.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.182744 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:22:08.184634 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:22:08.186271 systemd[1]: Reached target local-fs.target. Dec 13 02:22:08.187755 systemd[1]: Reached target sysinit.target. Dec 13 02:22:08.189461 systemd[1]: Reached target basic.target. Dec 13 02:22:08.194785 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:22:08.307375 systemd-fsck[1147]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 02:22:08.311288 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:22:08.318399 kernel: kauditd_printk_skb: 22 callbacks suppressed Dec 13 02:22:08.318432 kernel: audit: type=1130 audit(1734056528.311:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.314320 systemd[1]: Mounting sysroot.mount... Dec 13 02:22:08.335249 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:22:08.335958 systemd[1]: Mounted sysroot.mount. Dec 13 02:22:08.337539 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:22:08.340023 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:22:08.341950 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:22:08.342088 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:22:08.342127 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:22:08.348033 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:22:08.352773 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:22:08.354696 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:22:08.367488 initrd-setup-root[1169]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:22:08.374257 initrd-setup-root[1177]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:22:08.382248 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1164) Dec 13 02:22:08.384020 initrd-setup-root[1185]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:22:08.388865 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:22:08.388890 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 02:22:08.388902 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 02:22:08.395020 initrd-setup-root[1209]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:22:08.398243 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 02:22:08.403717 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:22:08.636130 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:22:08.646429 kernel: audit: type=1130 audit(1734056528.635:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.637261 systemd[1]: Starting ignition-mount.service... Dec 13 02:22:08.644433 systemd-networkd[1101]: eth0: Gained IPv6LL Dec 13 02:22:08.647371 systemd[1]: Starting sysroot-boot.service... Dec 13 02:22:08.655710 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:22:08.655840 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:22:08.678566 ignition[1230]: INFO : Ignition 2.14.0 Dec 13 02:22:08.678566 ignition[1230]: INFO : Stage: mount Dec 13 02:22:08.681868 ignition[1230]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:08.681868 ignition[1230]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:08.700308 systemd[1]: Finished sysroot-boot.service. Dec 13 02:22:08.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.709303 kernel: audit: type=1130 audit(1734056528.703:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.709328 ignition[1230]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:08.709328 ignition[1230]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:08.709328 ignition[1230]: INFO : PUT result: OK Dec 13 02:22:08.715887 ignition[1230]: INFO : mount: mount passed Dec 13 02:22:08.715887 ignition[1230]: INFO : Ignition finished successfully Dec 13 02:22:08.719945 systemd[1]: Finished ignition-mount.service. Dec 13 02:22:08.729132 kernel: audit: type=1130 audit(1734056528.719:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:08.721958 systemd[1]: Starting ignition-files.service... Dec 13 02:22:08.732363 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:22:08.745250 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1239) Dec 13 02:22:08.748851 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:22:08.748901 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 02:22:08.748913 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 02:22:08.756523 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 02:22:08.758779 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:22:08.771756 ignition[1258]: INFO : Ignition 2.14.0 Dec 13 02:22:08.771756 ignition[1258]: INFO : Stage: files Dec 13 02:22:08.773863 ignition[1258]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:08.773863 ignition[1258]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:08.783126 ignition[1258]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:08.784520 ignition[1258]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:08.786521 ignition[1258]: INFO : PUT result: OK Dec 13 02:22:08.790172 ignition[1258]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:22:08.795234 ignition[1258]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:22:08.795234 ignition[1258]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:22:08.814397 ignition[1258]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:22:08.816377 ignition[1258]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:22:08.820708 unknown[1258]: wrote ssh authorized keys file for user: core Dec 13 02:22:08.822507 ignition[1258]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:22:08.825284 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 02:22:08.827369 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:22:08.842440 ignition[1258]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem276434383" Dec 13 02:22:08.845375 ignition[1258]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem276434383": device or resource busy Dec 13 02:22:08.845375 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem276434383", trying btrfs: device or resource busy Dec 13 02:22:08.845375 ignition[1258]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem276434383" Dec 13 02:22:08.854968 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1260) Dec 13 02:22:08.854997 ignition[1258]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem276434383" Dec 13 02:22:08.857499 ignition[1258]: INFO : op(3): [started] unmounting "/mnt/oem276434383" Dec 13 02:22:08.857499 ignition[1258]: INFO : op(3): [finished] unmounting "/mnt/oem276434383" Dec 13 02:22:08.857499 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 02:22:08.857499 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:22:08.865645 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:22:08.868098 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:22:08.871319 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:22:08.871319 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:22:08.871319 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:22:08.871319 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 02:22:08.871319 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:22:08.886378 ignition[1258]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820252855" Dec 13 02:22:08.887890 ignition[1258]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820252855": device or resource busy Dec 13 02:22:08.887890 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1820252855", trying btrfs: device or resource busy Dec 13 02:22:08.887890 ignition[1258]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820252855" Dec 13 02:22:08.887890 ignition[1258]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820252855" Dec 13 02:22:08.894570 ignition[1258]: INFO : op(6): [started] unmounting "/mnt/oem1820252855" Dec 13 02:22:08.894570 ignition[1258]: INFO : op(6): [finished] unmounting "/mnt/oem1820252855" Dec 13 02:22:08.894570 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 02:22:08.899266 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 02:22:08.899266 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:22:08.908734 ignition[1258]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2395790082" Dec 13 02:22:08.910872 ignition[1258]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2395790082": device or resource busy Dec 13 02:22:08.910872 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2395790082", trying btrfs: device or resource busy Dec 13 02:22:08.910872 ignition[1258]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2395790082" Dec 13 02:22:08.910872 ignition[1258]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2395790082" Dec 13 02:22:08.918273 ignition[1258]: INFO : op(9): [started] unmounting "/mnt/oem2395790082" Dec 13 02:22:08.918273 ignition[1258]: INFO : op(9): [finished] unmounting "/mnt/oem2395790082" Dec 13 02:22:08.918273 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 02:22:08.918273 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 02:22:08.918273 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:22:08.938350 ignition[1258]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1658535978" Dec 13 02:22:08.938350 ignition[1258]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1658535978": device or resource busy Dec 13 02:22:08.938350 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1658535978", trying btrfs: device or resource busy Dec 13 02:22:08.938350 ignition[1258]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1658535978" Dec 13 02:22:08.946563 ignition[1258]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1658535978" Dec 13 02:22:08.946563 ignition[1258]: INFO : op(c): [started] unmounting "/mnt/oem1658535978" Dec 13 02:22:08.946563 ignition[1258]: INFO : op(c): [finished] unmounting "/mnt/oem1658535978" Dec 13 02:22:08.946563 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 02:22:08.946563 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:22:08.946563 ignition[1258]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:22:09.393216 ignition[1258]: INFO : GET result: OK Dec 13 02:22:09.744739 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:22:09.744739 ignition[1258]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:22:09.744739 ignition[1258]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:22:09.744739 ignition[1258]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(e): [started] processing unit "nvidia.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(e): [finished] processing unit "nvidia.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:22:09.757200 ignition[1258]: INFO : files: files passed Dec 13 02:22:09.757200 ignition[1258]: INFO : Ignition finished successfully Dec 13 02:22:09.782041 systemd[1]: Finished ignition-files.service. Dec 13 02:22:09.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.787235 kernel: audit: type=1130 audit(1734056529.781:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.788125 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:22:09.793386 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:22:09.796545 systemd[1]: Starting ignition-quench.service... Dec 13 02:22:09.801436 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:22:09.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.801592 systemd[1]: Finished ignition-quench.service. Dec 13 02:22:09.811231 kernel: audit: type=1130 audit(1734056529.801:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.811258 kernel: audit: type=1131 audit(1734056529.801:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.811316 initrd-setup-root-after-ignition[1283]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:22:09.813506 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:22:09.816366 systemd[1]: Reached target ignition-complete.target. Dec 13 02:22:09.822096 kernel: audit: type=1130 audit(1734056529.815:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.823149 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:22:09.841611 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:22:09.850820 kernel: audit: type=1130 audit(1734056529.841:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.850848 kernel: audit: type=1131 audit(1734056529.841:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.841699 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:22:09.842731 systemd[1]: Reached target initrd-fs.target. Dec 13 02:22:09.850855 systemd[1]: Reached target initrd.target. Dec 13 02:22:09.851816 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:22:09.853260 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:22:09.867146 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:22:09.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.869849 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:22:09.881474 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:22:09.881684 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:22:09.884966 systemd[1]: Stopped target timers.target. Dec 13 02:22:09.886714 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:22:09.887906 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:22:09.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.889690 systemd[1]: Stopped target initrd.target. Dec 13 02:22:09.891231 systemd[1]: Stopped target basic.target. Dec 13 02:22:09.893011 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:22:09.894975 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:22:09.896888 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:22:09.898919 systemd[1]: Stopped target remote-fs.target. Dec 13 02:22:09.900519 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:22:09.902171 systemd[1]: Stopped target sysinit.target. Dec 13 02:22:09.904017 systemd[1]: Stopped target local-fs.target. Dec 13 02:22:09.905772 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:22:09.907712 systemd[1]: Stopped target swap.target. Dec 13 02:22:09.909464 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:22:09.910634 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:22:09.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.912566 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:22:09.913591 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:22:09.914579 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:22:09.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.917687 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:22:09.919064 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:22:09.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.921388 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:22:09.922484 systemd[1]: Stopped ignition-files.service. Dec 13 02:22:09.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.925427 systemd[1]: Stopping ignition-mount.service... Dec 13 02:22:09.926886 systemd[1]: Stopping iscsiuio.service... Dec 13 02:22:09.933684 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:22:09.935091 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:22:09.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.937952 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:22:09.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.939310 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:22:09.939510 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:22:09.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.967772 ignition[1296]: INFO : Ignition 2.14.0 Dec 13 02:22:09.967772 ignition[1296]: INFO : Stage: umount Dec 13 02:22:09.967772 ignition[1296]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:22:09.967772 ignition[1296]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:22:09.943945 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:22:09.978099 ignition[1296]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:22:09.978099 ignition[1296]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:22:09.944495 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:22:09.981771 ignition[1296]: INFO : PUT result: OK Dec 13 02:22:09.951104 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:22:09.951200 systemd[1]: Stopped iscsiuio.service. Dec 13 02:22:09.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.955965 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:22:09.964238 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:22:09.991749 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:22:09.993549 ignition[1296]: INFO : umount: umount passed Dec 13 02:22:09.993549 ignition[1296]: INFO : Ignition finished successfully Dec 13 02:22:09.996764 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:22:09.996860 systemd[1]: Stopped ignition-mount.service. Dec 13 02:22:09.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.998907 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:22:09.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:09.998987 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:22:10.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.000578 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:22:10.000618 systemd[1]: Stopped ignition-disks.service. Dec 13 02:22:10.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.000816 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:22:10.000854 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:22:10.003392 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:22:10.003428 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:22:10.005370 systemd[1]: Stopped target network.target. Dec 13 02:22:10.006287 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:22:10.006386 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:22:10.008746 systemd[1]: Stopped target paths.target. Dec 13 02:22:10.011716 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:22:10.015309 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:22:10.016712 systemd[1]: Stopped target slices.target. Dec 13 02:22:10.018909 systemd[1]: Stopped target sockets.target. Dec 13 02:22:10.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.020730 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:22:10.020775 systemd[1]: Closed iscsid.socket. Dec 13 02:22:10.022738 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:22:10.022790 systemd[1]: Closed iscsiuio.socket. Dec 13 02:22:10.035239 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:22:10.035317 systemd[1]: Stopped ignition-setup.service. Dec 13 02:22:10.044152 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:22:10.044254 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:22:10.051970 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:22:10.079335 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:22:10.080504 systemd-networkd[1101]: eth0: DHCPv6 lease lost Dec 13 02:22:10.082303 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:22:10.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.082431 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:22:10.100015 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:22:10.100075 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:22:10.107000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:22:10.112335 systemd[1]: Stopping network-cleanup.service... Dec 13 02:22:10.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.113390 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:22:10.113582 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:22:10.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.114866 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:22:10.114929 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:22:10.116813 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:22:10.116868 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:22:10.139000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:22:10.128367 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:22:10.132000 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:22:10.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.132730 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:22:10.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.132867 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:22:10.143189 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:22:10.143340 systemd[1]: Stopped network-cleanup.service. Dec 13 02:22:10.144713 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:22:10.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.144865 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:22:10.148161 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:22:10.148210 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:22:10.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.151310 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:22:10.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.151387 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:22:10.155395 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:22:10.155540 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:22:10.158596 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:22:10.158857 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:22:10.162395 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:22:10.163404 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:22:10.177915 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:22:10.180751 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:22:10.180851 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:22:10.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.189714 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:22:10.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:10.189809 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:22:10.190956 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:22:10.196565 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:22:10.216298 systemd[1]: Switching root. Dec 13 02:22:10.247459 iscsid[1108]: iscsid shutting down. Dec 13 02:22:10.250255 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Dec 13 02:22:10.250334 systemd-journald[185]: Journal stopped Dec 13 02:22:15.580690 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:22:15.580782 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:22:15.580802 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:22:15.580823 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:22:15.580839 kernel: SELinux: policy capability open_perms=1 Dec 13 02:22:15.580861 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:22:15.580877 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:22:15.580894 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:22:15.580914 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:22:15.580932 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:22:15.580948 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:22:15.580970 systemd[1]: Successfully loaded SELinux policy in 87.858ms. Dec 13 02:22:15.581013 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.046ms. Dec 13 02:22:15.581039 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:22:15.581056 systemd[1]: Detected virtualization amazon. Dec 13 02:22:15.581074 systemd[1]: Detected architecture x86-64. Dec 13 02:22:15.581093 systemd[1]: Detected first boot. Dec 13 02:22:15.581111 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:22:15.581129 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:22:15.581152 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:22:15.581174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:22:15.581195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:22:15.581217 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:22:15.581260 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 02:22:15.581276 kernel: audit: type=1334 audit(1734056535.286:87): prog-id=12 op=LOAD Dec 13 02:22:15.581351 kernel: audit: type=1334 audit(1734056535.286:88): prog-id=3 op=UNLOAD Dec 13 02:22:15.581377 kernel: audit: type=1334 audit(1734056535.288:89): prog-id=13 op=LOAD Dec 13 02:22:15.581395 kernel: audit: type=1334 audit(1734056535.292:90): prog-id=14 op=LOAD Dec 13 02:22:15.581412 kernel: audit: type=1334 audit(1734056535.292:91): prog-id=4 op=UNLOAD Dec 13 02:22:15.581429 kernel: audit: type=1334 audit(1734056535.292:92): prog-id=5 op=UNLOAD Dec 13 02:22:15.581445 kernel: audit: type=1334 audit(1734056535.293:93): prog-id=15 op=LOAD Dec 13 02:22:15.581461 kernel: audit: type=1334 audit(1734056535.293:94): prog-id=12 op=UNLOAD Dec 13 02:22:15.581477 kernel: audit: type=1334 audit(1734056535.294:95): prog-id=16 op=LOAD Dec 13 02:22:15.581493 kernel: audit: type=1334 audit(1734056535.297:96): prog-id=17 op=LOAD Dec 13 02:22:15.581514 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:22:15.581532 systemd[1]: Stopped iscsid.service. Dec 13 02:22:15.581549 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:22:15.581566 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:22:15.581583 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:22:15.581602 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:22:15.581620 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:22:15.581677 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:22:15.581695 systemd[1]: Created slice system-getty.slice. Dec 13 02:22:15.581714 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:22:15.581732 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:22:15.581749 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:22:15.581768 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:22:15.581785 systemd[1]: Created slice user.slice. Dec 13 02:22:15.581803 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:22:15.581820 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:22:15.581842 systemd[1]: Set up automount boot.automount. Dec 13 02:22:15.581859 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:22:15.581880 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:22:15.581901 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:22:15.581919 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:22:15.581936 systemd[1]: Reached target integritysetup.target. Dec 13 02:22:15.581953 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:22:15.581971 systemd[1]: Reached target remote-fs.target. Dec 13 02:22:15.581988 systemd[1]: Reached target slices.target. Dec 13 02:22:15.582006 systemd[1]: Reached target swap.target. Dec 13 02:22:15.582026 systemd[1]: Reached target torcx.target. Dec 13 02:22:15.582044 systemd[1]: Reached target veritysetup.target. Dec 13 02:22:15.582060 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:22:15.582078 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:22:15.582095 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:22:15.582112 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:22:15.582130 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:22:15.582147 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:22:15.582165 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:22:15.582183 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:22:15.582200 systemd[1]: Mounting media.mount... Dec 13 02:22:15.582217 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:22:15.582267 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:22:15.582286 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:22:15.582303 systemd[1]: Mounting tmp.mount... Dec 13 02:22:15.582320 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:22:15.582336 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:22:15.582353 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:22:15.582417 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:22:15.582439 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:22:15.582469 systemd[1]: Starting modprobe@drm.service... Dec 13 02:22:15.582488 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:22:15.582506 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:22:15.582523 systemd[1]: Starting modprobe@loop.service... Dec 13 02:22:15.582542 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:22:15.582561 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:22:15.582580 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:22:15.582604 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:22:15.582624 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:22:15.582642 systemd[1]: Stopped systemd-journald.service. Dec 13 02:22:15.582662 systemd[1]: Starting systemd-journald.service... Dec 13 02:22:15.582682 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:22:15.582701 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:22:15.582762 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:22:15.582783 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:22:15.582802 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:22:15.582823 systemd[1]: Stopped verity-setup.service. Dec 13 02:22:15.582843 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:22:15.582864 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:22:15.582881 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:22:15.582899 systemd[1]: Mounted media.mount. Dec 13 02:22:15.582918 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:22:15.582939 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:22:15.582958 systemd[1]: Mounted tmp.mount. Dec 13 02:22:15.582975 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:22:15.582995 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:22:15.583015 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:22:15.583043 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:22:15.583065 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:22:15.583084 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:22:15.583105 systemd[1]: Finished modprobe@drm.service. Dec 13 02:22:15.583124 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:22:15.583186 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:22:15.583209 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:22:15.583245 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:22:15.583273 systemd-journald[1401]: Journal started Dec 13 02:22:15.584751 systemd-journald[1401]: Runtime Journal (/run/log/journal/ec2281aeaf95129bf25ff9042ade9668) is 4.8M, max 38.7M, 33.9M free. Dec 13 02:22:10.644000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:22:10.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:22:10.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:22:10.808000 audit: BPF prog-id=10 op=LOAD Dec 13 02:22:10.808000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:22:10.808000 audit: BPF prog-id=11 op=LOAD Dec 13 02:22:10.808000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:22:11.022000 audit[1329]: AVC avc: denied { associate } for pid=1329 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:22:11.022000 audit[1329]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1312 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:11.022000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:22:11.024000 audit[1329]: AVC avc: denied { associate } for pid=1329 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:22:11.024000 audit[1329]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=1312 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:11.024000 audit: CWD cwd="/" Dec 13 02:22:11.024000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:11.024000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:11.024000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:22:15.286000 audit: BPF prog-id=12 op=LOAD Dec 13 02:22:15.286000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:22:15.288000 audit: BPF prog-id=13 op=LOAD Dec 13 02:22:15.292000 audit: BPF prog-id=14 op=LOAD Dec 13 02:22:15.292000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:22:15.292000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:22:15.293000 audit: BPF prog-id=15 op=LOAD Dec 13 02:22:15.293000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:22:15.294000 audit: BPF prog-id=16 op=LOAD Dec 13 02:22:15.297000 audit: BPF prog-id=17 op=LOAD Dec 13 02:22:15.297000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:22:15.297000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:22:15.298000 audit: BPF prog-id=18 op=LOAD Dec 13 02:22:15.298000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:22:15.299000 audit: BPF prog-id=19 op=LOAD Dec 13 02:22:15.300000 audit: BPF prog-id=20 op=LOAD Dec 13 02:22:15.300000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:22:15.300000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:22:15.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.305000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:22:15.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.506000 audit: BPF prog-id=21 op=LOAD Dec 13 02:22:15.507000 audit: BPF prog-id=22 op=LOAD Dec 13 02:22:15.507000 audit: BPF prog-id=23 op=LOAD Dec 13 02:22:15.507000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:22:15.507000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:22:15.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.590434 systemd[1]: Started systemd-journald.service. Dec 13 02:22:15.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.575000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:22:15.575000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc090d58f0 a2=4000 a3=7ffc090d598c items=0 ppid=1 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.575000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:22:15.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:11.009740 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:22:15.280839 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:22:11.010284 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:22:15.302041 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:22:15.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:11.010311 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:22:15.590633 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:22:11.010350 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:22:11.010366 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:22:11.010463 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:22:15.592451 systemd[1]: Reached target network-pre.target. Dec 13 02:22:11.010485 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:22:11.010770 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:22:11.010832 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:22:11.010852 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:22:11.022194 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:22:11.022282 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:22:11.022304 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:22:11.022326 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:22:11.022350 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:22:11.022364 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:22:14.721460 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:22:14.721721 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:22:14.721826 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:22:14.722076 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:22:15.599671 kernel: fuse: init (API version 7.34) Dec 13 02:22:15.595207 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:22:14.722127 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:22:15.597155 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:22:14.722185 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-12-13T02:22:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:22:15.599692 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:22:15.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.637108 systemd-journald[1401]: Time spent on flushing to /var/log/journal/ec2281aeaf95129bf25ff9042ade9668 is 39.946ms for 1162 entries. Dec 13 02:22:15.637108 systemd-journald[1401]: System Journal (/var/log/journal/ec2281aeaf95129bf25ff9042ade9668) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:22:15.721140 systemd-journald[1401]: Received client request to flush runtime journal. Dec 13 02:22:15.721203 kernel: loop: module loaded Dec 13 02:22:15.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.602326 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:22:15.603395 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:22:15.604884 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:22:15.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.607657 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:22:15.615396 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:22:15.615585 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:22:15.616897 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:22:15.624809 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:22:15.627628 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:22:15.648104 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:22:15.648969 systemd[1]: Finished modprobe@loop.service. Dec 13 02:22:15.650625 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:22:15.667458 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:22:15.669047 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:22:15.670124 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:22:15.722445 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:22:15.756556 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:22:15.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.760660 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:22:15.774363 udevadm[1441]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:22:15.786126 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:22:15.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:15.789122 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:22:15.904425 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:22:15.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:16.512252 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:22:16.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:16.512000 audit: BPF prog-id=24 op=LOAD Dec 13 02:22:16.512000 audit: BPF prog-id=25 op=LOAD Dec 13 02:22:16.512000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:22:16.512000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:22:16.514814 systemd[1]: Starting systemd-udevd.service... Dec 13 02:22:16.538411 systemd-udevd[1448]: Using default interface naming scheme 'v252'. Dec 13 02:22:16.571655 systemd[1]: Started systemd-udevd.service. Dec 13 02:22:16.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:16.573000 audit: BPF prog-id=26 op=LOAD Dec 13 02:22:16.576047 systemd[1]: Starting systemd-networkd.service... Dec 13 02:22:16.620000 audit: BPF prog-id=27 op=LOAD Dec 13 02:22:16.620000 audit: BPF prog-id=28 op=LOAD Dec 13 02:22:16.620000 audit: BPF prog-id=29 op=LOAD Dec 13 02:22:16.623050 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:22:16.657764 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:22:16.680037 systemd[1]: Started systemd-userdbd.service. Dec 13 02:22:16.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:16.684062 (udev-worker)[1455]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:22:16.776252 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 02:22:16.786987 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:22:16.787190 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Dec 13 02:22:16.790293 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:22:16.797000 audit[1454]: AVC avc: denied { confidentiality } for pid=1454 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:22:16.797000 audit[1454]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56372fd4f600 a1=337fc a2=7f7cfedd2bc5 a3=5 items=110 ppid=1448 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:16.797000 audit: CWD cwd="/" Dec 13 02:22:16.797000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=1 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=2 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=3 name=(null) inode=14876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=4 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=5 name=(null) inode=14877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=6 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=7 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=8 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=9 name=(null) inode=14879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=10 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=11 name=(null) inode=14880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=12 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=13 name=(null) inode=14881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=14 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=15 name=(null) inode=14882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=16 name=(null) inode=14878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=17 name=(null) inode=14883 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=18 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=19 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=20 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=21 name=(null) inode=14885 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=22 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=23 name=(null) inode=14886 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=24 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=25 name=(null) inode=14887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=26 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=27 name=(null) inode=14888 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=28 name=(null) inode=14884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=29 name=(null) inode=14889 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=30 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=31 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=32 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=33 name=(null) inode=14891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=34 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=35 name=(null) inode=14892 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=36 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=37 name=(null) inode=14893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=38 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=39 name=(null) inode=14894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=40 name=(null) inode=14890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=41 name=(null) inode=14895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=42 name=(null) inode=14875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=43 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=44 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=45 name=(null) inode=14897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=46 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=47 name=(null) inode=14898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=48 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=49 name=(null) inode=14899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=50 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=51 name=(null) inode=14900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=52 name=(null) inode=14896 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=53 name=(null) inode=14901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=55 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=56 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=57 name=(null) inode=14903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=58 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=59 name=(null) inode=14904 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=60 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=61 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.825685 systemd-networkd[1457]: lo: Link UP Dec 13 02:22:16.825701 systemd-networkd[1457]: lo: Gained carrier Dec 13 02:22:16.826478 systemd-networkd[1457]: Enumeration completed Dec 13 02:22:16.826598 systemd[1]: Started systemd-networkd.service. Dec 13 02:22:16.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:16.829505 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:22:16.834193 systemd-networkd[1457]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:22:16.840897 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:22:16.840427 systemd-networkd[1457]: eth0: Link UP Dec 13 02:22:16.840605 systemd-networkd[1457]: eth0: Gained carrier Dec 13 02:22:16.851407 systemd-networkd[1457]: eth0: DHCPv4 address 172.31.21.209/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 02:22:16.856273 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 02:22:16.872268 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1464) Dec 13 02:22:16.797000 audit: PATH item=62 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=63 name=(null) inode=14906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=64 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=65 name=(null) inode=14907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=66 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=67 name=(null) inode=14908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=68 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=69 name=(null) inode=14909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=70 name=(null) inode=14905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=71 name=(null) inode=14910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=72 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=73 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=74 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=75 name=(null) inode=14912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=76 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=77 name=(null) inode=14913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=78 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=79 name=(null) inode=14914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=80 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=81 name=(null) inode=14915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=82 name=(null) inode=14911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=83 name=(null) inode=14916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=84 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=85 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=86 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=87 name=(null) inode=14918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=88 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=89 name=(null) inode=14919 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=90 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=91 name=(null) inode=14920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=92 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=93 name=(null) inode=14921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=94 name=(null) inode=14917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=95 name=(null) inode=14922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=96 name=(null) inode=14902 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=97 name=(null) inode=14923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=98 name=(null) inode=14923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=99 name=(null) inode=14924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=100 name=(null) inode=14923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=101 name=(null) inode=14925 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=102 name=(null) inode=14923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=103 name=(null) inode=14926 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=104 name=(null) inode=14923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=105 name=(null) inode=14927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=106 name=(null) inode=14923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=107 name=(null) inode=14928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PATH item=109 name=(null) inode=14929 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:16.797000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:22:16.904250 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Dec 13 02:22:16.923251 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:22:16.998727 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:22:17.076682 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:22:17.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.078935 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:22:17.136321 lvm[1562]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:22:17.166526 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:22:17.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.167841 systemd[1]: Reached target cryptsetup.target. Dec 13 02:22:17.171800 systemd[1]: Starting lvm2-activation.service... Dec 13 02:22:17.183992 lvm[1563]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:22:17.224536 systemd[1]: Finished lvm2-activation.service. Dec 13 02:22:17.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.225848 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:22:17.226800 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:22:17.226844 systemd[1]: Reached target local-fs.target. Dec 13 02:22:17.227949 systemd[1]: Reached target machines.target. Dec 13 02:22:17.230342 systemd[1]: Starting ldconfig.service... Dec 13 02:22:17.231865 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:22:17.232120 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:17.233558 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:22:17.236056 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:22:17.238802 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:22:17.241420 systemd[1]: Starting systemd-sysext.service... Dec 13 02:22:17.264572 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1565 (bootctl) Dec 13 02:22:17.266891 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:22:17.270907 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:22:17.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.276295 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:22:17.309495 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:22:17.309854 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:22:17.324250 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:22:17.380829 systemd-fsck[1573]: fsck.fat 4.2 (2021-01-31) Dec 13 02:22:17.380829 systemd-fsck[1573]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 02:22:17.384445 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:22:17.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.387112 systemd[1]: Mounting boot.mount... Dec 13 02:22:17.400522 systemd[1]: Mounted boot.mount. Dec 13 02:22:17.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.421978 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:22:17.554248 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:22:17.583321 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:22:17.598086 (sd-sysext)[1589]: Using extensions 'kubernetes'. Dec 13 02:22:17.598682 (sd-sysext)[1589]: Merged extensions into '/usr'. Dec 13 02:22:17.620097 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:22:17.622007 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:22:17.627449 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:22:17.630193 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:22:17.636182 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:22:17.641002 systemd[1]: Starting modprobe@loop.service... Dec 13 02:22:17.641936 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:22:17.642115 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:17.642328 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:22:17.646457 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:22:17.648511 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:22:17.648685 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:22:17.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.650379 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:22:17.650609 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:22:17.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.652056 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:22:17.652214 systemd[1]: Finished modprobe@loop.service. Dec 13 02:22:17.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.654008 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:22:17.654119 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:22:17.658746 systemd[1]: Finished systemd-sysext.service. Dec 13 02:22:17.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:17.662967 systemd[1]: Starting ensure-sysext.service... Dec 13 02:22:17.667168 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:22:17.676514 systemd[1]: Reloading. Dec 13 02:22:17.737387 systemd-tmpfiles[1596]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:22:17.744412 systemd-tmpfiles[1596]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:22:17.788438 systemd-tmpfiles[1596]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:22:17.825348 /usr/lib/systemd/system-generators/torcx-generator[1616]: time="2024-12-13T02:22:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:22:17.825387 /usr/lib/systemd/system-generators/torcx-generator[1616]: time="2024-12-13T02:22:17Z" level=info msg="torcx already run" Dec 13 02:22:17.969141 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:22:17.969789 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:22:18.008263 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:22:18.146000 audit: BPF prog-id=30 op=LOAD Dec 13 02:22:18.146000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:22:18.147000 audit: BPF prog-id=31 op=LOAD Dec 13 02:22:18.148000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:22:18.148000 audit: BPF prog-id=32 op=LOAD Dec 13 02:22:18.148000 audit: BPF prog-id=33 op=LOAD Dec 13 02:22:18.148000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:22:18.148000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:22:18.149000 audit: BPF prog-id=34 op=LOAD Dec 13 02:22:18.149000 audit: BPF prog-id=35 op=LOAD Dec 13 02:22:18.149000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:22:18.149000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:22:18.150000 audit: BPF prog-id=36 op=LOAD Dec 13 02:22:18.150000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:22:18.150000 audit: BPF prog-id=37 op=LOAD Dec 13 02:22:18.150000 audit: BPF prog-id=38 op=LOAD Dec 13 02:22:18.150000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:22:18.151000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:22:18.162803 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:22:18.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.178931 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:22:18.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.183124 systemd[1]: Starting audit-rules.service... Dec 13 02:22:18.186098 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:22:18.194000 audit: BPF prog-id=39 op=LOAD Dec 13 02:22:18.193836 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:22:18.198577 systemd[1]: Starting systemd-resolved.service... Dec 13 02:22:18.200000 audit: BPF prog-id=40 op=LOAD Dec 13 02:22:18.203485 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:22:18.208859 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:22:18.219160 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.223624 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:22:18.226922 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:22:18.230279 systemd[1]: Starting modprobe@loop.service... Dec 13 02:22:18.231446 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.231655 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:18.238974 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.239197 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.239320 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:18.244277 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:22:18.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.246087 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.248150 systemd[1]: Starting modprobe@drm.service... Dec 13 02:22:18.248000 audit[1675]: SYSTEM_BOOT pid=1675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.249517 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.249693 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:18.249925 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:22:18.250873 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:22:18.251006 systemd[1]: Finished modprobe@loop.service. Dec 13 02:22:18.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.256584 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:22:18.256752 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:22:18.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.258365 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:22:18.258531 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:22:18.260416 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:22:18.260585 systemd[1]: Finished modprobe@drm.service. Dec 13 02:22:18.262448 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:22:18.262697 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.267575 systemd[1]: Finished ensure-sysext.service. Dec 13 02:22:18.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.273468 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:22:18.301493 ldconfig[1564]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:22:18.310359 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:22:18.310857 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:22:18.310879 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:22:18.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.314007 systemd[1]: Finished ldconfig.service. Dec 13 02:22:18.345208 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:22:18.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.348538 systemd[1]: Starting systemd-update-done.service... Dec 13 02:22:18.358822 systemd[1]: Finished systemd-update-done.service. Dec 13 02:22:18.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:18.378530 systemd-resolved[1673]: Positive Trust Anchors: Dec 13 02:22:18.378558 systemd-resolved[1673]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:22:18.378601 systemd-resolved[1673]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:22:18.389000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:22:18.389000 audit[1695]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe919b26b0 a2=420 a3=0 items=0 ppid=1669 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:18.389000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:22:18.391161 augenrules[1695]: No rules Dec 13 02:22:18.391583 systemd[1]: Finished audit-rules.service. Dec 13 02:22:18.393584 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:22:18.394865 systemd[1]: Reached target time-set.target. Dec 13 02:22:18.433325 systemd-resolved[1673]: Defaulting to hostname 'linux'. Dec 13 02:22:18.435393 systemd[1]: Started systemd-resolved.service. Dec 13 02:22:18.436450 systemd[1]: Reached target network.target. Dec 13 02:22:18.437412 systemd[1]: Reached target nss-lookup.target. Dec 13 02:22:18.438372 systemd[1]: Reached target sysinit.target. Dec 13 02:22:18.439310 systemd[1]: Started motdgen.path. Dec 13 02:22:18.440329 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:22:18.441764 systemd[1]: Started logrotate.timer. Dec 13 02:22:18.442836 systemd[1]: Started mdadm.timer. Dec 13 02:22:18.443578 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:22:18.444541 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:22:18.444570 systemd[1]: Reached target paths.target. Dec 13 02:22:18.445368 systemd[1]: Reached target timers.target. Dec 13 02:22:18.446447 systemd[1]: Listening on dbus.socket. Dec 13 02:22:18.451884 systemd[1]: Starting docker.socket... Dec 13 02:22:18.456803 systemd[1]: Listening on sshd.socket. Dec 13 02:22:18.458034 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:18.463034 systemd[1]: Listening on docker.socket. Dec 13 02:22:18.464059 systemd[1]: Reached target sockets.target. Dec 13 02:22:18.464971 systemd[1]: Reached target basic.target. Dec 13 02:22:18.465825 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.465855 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:22:18.467113 systemd[1]: Starting containerd.service... Dec 13 02:22:19.025141 systemd-timesyncd[1674]: Contacted time server 198.211.103.209:123 (0.flatcar.pool.ntp.org). Dec 13 02:22:19.025199 systemd-timesyncd[1674]: Initial clock synchronization to Fri 2024-12-13 02:22:19.024937 UTC. Dec 13 02:22:19.025672 systemd-resolved[1673]: Clock change detected. Flushing caches. Dec 13 02:22:19.026850 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:22:19.037053 systemd[1]: Starting dbus.service... Dec 13 02:22:19.039809 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:22:19.054745 systemd[1]: Starting extend-filesystems.service... Dec 13 02:22:19.058469 jq[1706]: false Dec 13 02:22:19.056503 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:22:19.058380 systemd[1]: Starting motdgen.service... Dec 13 02:22:19.061036 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:22:19.065125 systemd[1]: Starting sshd-keygen.service... Dec 13 02:22:19.076210 systemd[1]: Starting systemd-logind.service... Dec 13 02:22:19.077326 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:22:19.077475 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:22:19.078309 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:22:19.080585 systemd[1]: Starting update-engine.service... Dec 13 02:22:19.085018 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:22:19.101754 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:22:19.102115 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:22:19.132981 jq[1715]: true Dec 13 02:22:19.144216 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:22:19.144555 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:22:19.147225 dbus-daemon[1705]: [system] SELinux support is enabled Dec 13 02:22:19.148859 systemd[1]: Started dbus.service. Dec 13 02:22:19.155403 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:22:19.155451 systemd[1]: Reached target system-config.target. Dec 13 02:22:19.157277 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:22:19.157310 systemd[1]: Reached target user-config.target. Dec 13 02:22:19.170571 dbus-daemon[1705]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1457 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:22:19.181551 jq[1728]: true Dec 13 02:22:19.204483 extend-filesystems[1707]: Found loop1 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p1 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p2 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p3 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found usr Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p4 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p6 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p7 Dec 13 02:22:19.205746 extend-filesystems[1707]: Found nvme0n1p9 Dec 13 02:22:19.205746 extend-filesystems[1707]: Checking size of /dev/nvme0n1p9 Dec 13 02:22:19.220137 dbus-daemon[1705]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:22:19.223102 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:22:19.223326 systemd[1]: Finished motdgen.service. Dec 13 02:22:19.226701 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:22:19.237256 extend-filesystems[1707]: Resized partition /dev/nvme0n1p9 Dec 13 02:22:19.250024 extend-filesystems[1755]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:22:19.274146 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 02:22:19.336100 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 02:22:19.377039 update_engine[1713]: I1213 02:22:19.373816 1713 main.cc:92] Flatcar Update Engine starting Dec 13 02:22:19.381153 env[1717]: time="2024-12-13T02:22:19.379486104Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:22:19.384317 extend-filesystems[1755]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 02:22:19.384317 extend-filesystems[1755]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 02:22:19.384317 extend-filesystems[1755]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 02:22:19.382102 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:22:19.389799 bash[1756]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:22:19.389915 extend-filesystems[1707]: Resized filesystem in /dev/nvme0n1p9 Dec 13 02:22:19.382317 systemd[1]: Finished extend-filesystems.service. Dec 13 02:22:19.386642 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:22:19.403650 systemd[1]: Started update-engine.service. Dec 13 02:22:19.404873 update_engine[1713]: I1213 02:22:19.403716 1713 update_check_scheduler.cc:74] Next update check in 10m52s Dec 13 02:22:19.406757 systemd[1]: Started locksmithd.service. Dec 13 02:22:19.417993 dbus-daemon[1705]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:22:19.418197 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:22:19.418655 dbus-daemon[1705]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1749 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:22:19.422467 systemd[1]: Starting polkit.service... Dec 13 02:22:19.437359 systemd-networkd[1457]: eth0: Gained IPv6LL Dec 13 02:22:19.439900 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:22:19.441165 systemd[1]: Reached target network-online.target. Dec 13 02:22:19.443867 systemd[1]: Started amazon-ssm-agent.service. Dec 13 02:22:19.446533 systemd[1]: Starting kubelet.service... Dec 13 02:22:19.448735 systemd[1]: Started nvidia.service. Dec 13 02:22:19.458243 systemd-logind[1712]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:22:19.458277 systemd-logind[1712]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 02:22:19.458301 systemd-logind[1712]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:22:19.463740 systemd-logind[1712]: New seat seat0. Dec 13 02:22:19.469767 systemd[1]: Started systemd-logind.service. Dec 13 02:22:19.506446 polkitd[1779]: Started polkitd version 121 Dec 13 02:22:19.655683 polkitd[1779]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:22:19.655773 polkitd[1779]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:22:19.657662 polkitd[1779]: Finished loading, compiling and executing 2 rules Dec 13 02:22:19.658999 dbus-daemon[1705]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:22:19.659392 systemd[1]: Started polkit.service. Dec 13 02:22:19.660536 polkitd[1779]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:22:19.699536 systemd-hostnamed[1749]: Hostname set to (transient) Dec 13 02:22:19.707493 env[1717]: time="2024-12-13T02:22:19.707440667Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:22:19.707796 env[1717]: time="2024-12-13T02:22:19.707775346Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:22:19.709629 env[1717]: time="2024-12-13T02:22:19.709588253Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:22:19.722046 systemd-resolved[1673]: System hostname changed to 'ip-172-31-21-209'. Dec 13 02:22:19.744264 env[1717]: time="2024-12-13T02:22:19.744216685Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:22:19.744897 env[1717]: time="2024-12-13T02:22:19.744863527Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:22:19.745009 env[1717]: time="2024-12-13T02:22:19.744993040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:22:19.745109 env[1717]: time="2024-12-13T02:22:19.745070003Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:22:19.745199 env[1717]: time="2024-12-13T02:22:19.745184374Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:22:19.745431 env[1717]: time="2024-12-13T02:22:19.745407651Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:22:19.745929 env[1717]: time="2024-12-13T02:22:19.745906970Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:22:19.748437 env[1717]: time="2024-12-13T02:22:19.748406859Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:22:19.748549 env[1717]: time="2024-12-13T02:22:19.748530294Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:22:19.748732 env[1717]: time="2024-12-13T02:22:19.748711067Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:22:19.748841 env[1717]: time="2024-12-13T02:22:19.748825138Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:22:19.764017 env[1717]: time="2024-12-13T02:22:19.763850089Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:22:19.764291 env[1717]: time="2024-12-13T02:22:19.764253165Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:22:19.764427 env[1717]: time="2024-12-13T02:22:19.764406927Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:22:19.764751 env[1717]: time="2024-12-13T02:22:19.764728848Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.764873 env[1717]: time="2024-12-13T02:22:19.764855049Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.764979 env[1717]: time="2024-12-13T02:22:19.764963439Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.765070 env[1717]: time="2024-12-13T02:22:19.765055139Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.765196 env[1717]: time="2024-12-13T02:22:19.765181048Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.765291 env[1717]: time="2024-12-13T02:22:19.765277044Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.765382 env[1717]: time="2024-12-13T02:22:19.765368166Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.765474 env[1717]: time="2024-12-13T02:22:19.765460044Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.765562 env[1717]: time="2024-12-13T02:22:19.765548583Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:22:19.765814 env[1717]: time="2024-12-13T02:22:19.765794213Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:22:19.766117 env[1717]: time="2024-12-13T02:22:19.766056803Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:22:19.766595 env[1717]: time="2024-12-13T02:22:19.766571240Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:22:19.766731 env[1717]: time="2024-12-13T02:22:19.766713259Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.766833 env[1717]: time="2024-12-13T02:22:19.766818158Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:22:19.766986 env[1717]: time="2024-12-13T02:22:19.766970588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767071 env[1717]: time="2024-12-13T02:22:19.767056420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767198 env[1717]: time="2024-12-13T02:22:19.767180283Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767305 env[1717]: time="2024-12-13T02:22:19.767287516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767424 env[1717]: time="2024-12-13T02:22:19.767406972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767528 env[1717]: time="2024-12-13T02:22:19.767509975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767636 env[1717]: time="2024-12-13T02:22:19.767621509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767736 env[1717]: time="2024-12-13T02:22:19.767720659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.767860 env[1717]: time="2024-12-13T02:22:19.767846165Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:22:19.768207 env[1717]: time="2024-12-13T02:22:19.768178500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.768317 env[1717]: time="2024-12-13T02:22:19.768300083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.768415 env[1717]: time="2024-12-13T02:22:19.768400736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.768490 env[1717]: time="2024-12-13T02:22:19.768476143Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:22:19.768578 env[1717]: time="2024-12-13T02:22:19.768559495Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:22:19.768674 env[1717]: time="2024-12-13T02:22:19.768632200Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:22:19.768769 env[1717]: time="2024-12-13T02:22:19.768752844Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:22:19.768873 env[1717]: time="2024-12-13T02:22:19.768858126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:22:19.769300 env[1717]: time="2024-12-13T02:22:19.769211998Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:22:19.771499 env[1717]: time="2024-12-13T02:22:19.771136867Z" level=info msg="Connect containerd service" Dec 13 02:22:19.771499 env[1717]: time="2024-12-13T02:22:19.771195731Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:22:19.772425 env[1717]: time="2024-12-13T02:22:19.772394811Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:22:19.773289 amazon-ssm-agent[1780]: 2024/12/13 02:22:19 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 02:22:19.775601 amazon-ssm-agent[1780]: Initializing new seelog logger Dec 13 02:22:19.775601 amazon-ssm-agent[1780]: New Seelog Logger Creation Complete Dec 13 02:22:19.775601 amazon-ssm-agent[1780]: 2024/12/13 02:22:19 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 02:22:19.775601 amazon-ssm-agent[1780]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 02:22:19.775776 amazon-ssm-agent[1780]: 2024/12/13 02:22:19 processing appconfig overrides Dec 13 02:22:19.776597 env[1717]: time="2024-12-13T02:22:19.776445991Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:22:19.780323 env[1717]: time="2024-12-13T02:22:19.780297958Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:22:19.782298 systemd[1]: Started containerd.service. Dec 13 02:22:19.782553 env[1717]: time="2024-12-13T02:22:19.782532736Z" level=info msg="containerd successfully booted in 0.476933s" Dec 13 02:22:19.792130 env[1717]: time="2024-12-13T02:22:19.791989932Z" level=info msg="Start subscribing containerd event" Dec 13 02:22:19.805459 env[1717]: time="2024-12-13T02:22:19.805230109Z" level=info msg="Start recovering state" Dec 13 02:22:19.820295 env[1717]: time="2024-12-13T02:22:19.820253964Z" level=info msg="Start event monitor" Dec 13 02:22:19.822155 env[1717]: time="2024-12-13T02:22:19.822125000Z" level=info msg="Start snapshots syncer" Dec 13 02:22:19.822306 env[1717]: time="2024-12-13T02:22:19.822288794Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:22:19.822403 env[1717]: time="2024-12-13T02:22:19.822387943Z" level=info msg="Start streaming server" Dec 13 02:22:19.915592 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 02:22:20.039329 coreos-metadata[1704]: Dec 13 02:22:20.034 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 02:22:20.054967 coreos-metadata[1704]: Dec 13 02:22:20.054 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 02:22:20.056060 coreos-metadata[1704]: Dec 13 02:22:20.055 INFO Fetch successful Dec 13 02:22:20.056230 coreos-metadata[1704]: Dec 13 02:22:20.056 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 02:22:20.057390 coreos-metadata[1704]: Dec 13 02:22:20.057 INFO Fetch successful Dec 13 02:22:20.060730 unknown[1704]: wrote ssh authorized keys file for user: core Dec 13 02:22:20.089543 update-ssh-keys[1875]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:22:20.090524 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Create new startup processor Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing bookkeeping folders Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO removing the completed state files Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing bookkeeping folders for long running plugins Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing healthcheck folders for long running plugins Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing locations for inventory plugin Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing default location for custom inventory Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing default location for file inventory Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Initializing default location for role inventory Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Init the cloudwatchlogs publisher Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:configurePackage Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:downloadContent Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:runDocument Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 02:22:20.294307 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform independent plugin aws:configureDocker Dec 13 02:22:20.295197 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 02:22:20.295197 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 02:22:20.295197 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO OS: linux, Arch: amd64 Dec 13 02:22:20.295826 amazon-ssm-agent[1780]: datastore file /var/lib/amazon/ssm/i-0970d191669a2692a/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 02:22:20.393217 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 02:22:20.491651 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 02:22:20.586032 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 02:22:20.680504 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] Starting message polling Dec 13 02:22:20.775254 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 02:22:20.808350 locksmithd[1778]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:22:20.836605 sshd_keygen[1729]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:22:20.871865 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [instanceID=i-0970d191669a2692a] Starting association polling Dec 13 02:22:20.873059 systemd[1]: Finished sshd-keygen.service. Dec 13 02:22:20.876790 systemd[1]: Starting issuegen.service... Dec 13 02:22:20.888034 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:22:20.888256 systemd[1]: Finished issuegen.service. Dec 13 02:22:20.891844 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:22:20.903673 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:22:20.906758 systemd[1]: Started getty@tty1.service. Dec 13 02:22:20.909813 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:22:20.911196 systemd[1]: Reached target getty.target. Dec 13 02:22:20.967047 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 02:22:21.062399 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 02:22:21.085487 systemd[1]: Started kubelet.service. Dec 13 02:22:21.086835 systemd[1]: Reached target multi-user.target. Dec 13 02:22:21.090211 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:22:21.107308 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:22:21.107518 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:22:21.108803 systemd[1]: Startup finished in 653ms (kernel) + 6.770s (initrd) + 10.004s (userspace) = 17.428s. Dec 13 02:22:21.168262 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 02:22:21.264963 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 02:22:21.360922 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 02:22:21.457059 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 02:22:21.553273 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 02:22:21.649902 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0970d191669a2692a, requestId: 5e2ff282-8d18-4ac8-8796-baa600542e8e Dec 13 02:22:21.746516 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 02:22:21.785134 kubelet[1909]: E1213 02:22:21.785068 1909 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:22:21.787099 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:22:21.787263 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:22:21.787520 systemd[1]: kubelet.service: Consumed 1.120s CPU time. Dec 13 02:22:21.843354 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [OfflineService] Starting document processing engine... Dec 13 02:22:21.940609 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [OfflineService] [EngineProcessor] Starting Dec 13 02:22:22.037810 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 02:22:22.135294 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [OfflineService] Starting message polling Dec 13 02:22:22.233153 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [OfflineService] Starting send replies to MDS Dec 13 02:22:22.330981 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 02:22:22.429025 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 02:22:22.527351 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] listening reply. Dec 13 02:22:22.625741 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 02:22:22.724530 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 02:22:22.823517 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [StartupProcessor] Executing startup processor tasks Dec 13 02:22:22.922509 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 02:22:23.021725 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 02:22:23.121239 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 02:22:23.220824 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0970d191669a2692a?role=subscribe&stream=input Dec 13 02:22:23.320708 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0970d191669a2692a?role=subscribe&stream=input Dec 13 02:22:23.420856 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 02:22:23.521237 amazon-ssm-agent[1780]: 2024-12-13 02:22:20 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 02:22:27.830240 systemd[1]: Created slice system-sshd.slice. Dec 13 02:22:27.832063 systemd[1]: Started sshd@0-172.31.21.209:22-139.178.68.195:33790.service. Dec 13 02:22:28.009706 sshd[1917]: Accepted publickey for core from 139.178.68.195 port 33790 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:28.013725 sshd[1917]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:28.029666 systemd[1]: Created slice user-500.slice. Dec 13 02:22:28.031869 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:22:28.035128 systemd-logind[1712]: New session 1 of user core. Dec 13 02:22:28.046415 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:22:28.049566 systemd[1]: Starting user@500.service... Dec 13 02:22:28.054036 (systemd)[1920]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:28.190410 systemd[1920]: Queued start job for default target default.target. Dec 13 02:22:28.191313 systemd[1920]: Reached target paths.target. Dec 13 02:22:28.191349 systemd[1920]: Reached target sockets.target. Dec 13 02:22:28.191368 systemd[1920]: Reached target timers.target. Dec 13 02:22:28.191385 systemd[1920]: Reached target basic.target. Dec 13 02:22:28.191509 systemd[1]: Started user@500.service. Dec 13 02:22:28.192835 systemd[1]: Started session-1.scope. Dec 13 02:22:28.193678 systemd[1920]: Reached target default.target. Dec 13 02:22:28.193921 systemd[1920]: Startup finished in 130ms. Dec 13 02:22:28.347253 systemd[1]: Started sshd@1-172.31.21.209:22-139.178.68.195:33800.service. Dec 13 02:22:28.511274 sshd[1929]: Accepted publickey for core from 139.178.68.195 port 33800 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:28.512884 sshd[1929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:28.524207 systemd-logind[1712]: New session 2 of user core. Dec 13 02:22:28.525332 systemd[1]: Started session-2.scope. Dec 13 02:22:28.653768 sshd[1929]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:28.657526 systemd[1]: sshd@1-172.31.21.209:22-139.178.68.195:33800.service: Deactivated successfully. Dec 13 02:22:28.658476 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:22:28.659235 systemd-logind[1712]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:22:28.660163 systemd-logind[1712]: Removed session 2. Dec 13 02:22:28.680458 systemd[1]: Started sshd@2-172.31.21.209:22-139.178.68.195:33810.service. Dec 13 02:22:28.840396 sshd[1935]: Accepted publickey for core from 139.178.68.195 port 33810 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:28.842171 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:28.847280 systemd-logind[1712]: New session 3 of user core. Dec 13 02:22:28.848353 systemd[1]: Started session-3.scope. Dec 13 02:22:28.971866 sshd[1935]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:28.975423 systemd[1]: sshd@2-172.31.21.209:22-139.178.68.195:33810.service: Deactivated successfully. Dec 13 02:22:28.976332 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:22:28.977017 systemd-logind[1712]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:22:28.977988 systemd-logind[1712]: Removed session 3. Dec 13 02:22:28.998474 systemd[1]: Started sshd@3-172.31.21.209:22-139.178.68.195:33814.service. Dec 13 02:22:29.159424 sshd[1941]: Accepted publickey for core from 139.178.68.195 port 33814 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:29.161167 sshd[1941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:29.167667 systemd[1]: Started session-4.scope. Dec 13 02:22:29.168948 systemd-logind[1712]: New session 4 of user core. Dec 13 02:22:29.299767 sshd[1941]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:29.304102 systemd[1]: sshd@3-172.31.21.209:22-139.178.68.195:33814.service: Deactivated successfully. Dec 13 02:22:29.305251 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:22:29.306120 systemd-logind[1712]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:22:29.308476 systemd-logind[1712]: Removed session 4. Dec 13 02:22:29.340875 systemd[1]: Started sshd@4-172.31.21.209:22-139.178.68.195:33820.service. Dec 13 02:22:29.514316 sshd[1947]: Accepted publickey for core from 139.178.68.195 port 33820 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:29.516137 sshd[1947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:29.524486 systemd[1]: Started session-5.scope. Dec 13 02:22:29.525192 systemd-logind[1712]: New session 5 of user core. Dec 13 02:22:29.641507 sudo[1950]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:22:29.641845 sudo[1950]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:22:29.664368 dbus-daemon[1705]: \xd0\u001d\xa5pUU: received setenforce notice (enforcing=-843697840) Dec 13 02:22:29.669136 sudo[1950]: pam_unix(sudo:session): session closed for user root Dec 13 02:22:29.694056 sshd[1947]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:29.698004 systemd[1]: sshd@4-172.31.21.209:22-139.178.68.195:33820.service: Deactivated successfully. Dec 13 02:22:29.698942 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:22:29.699616 systemd-logind[1712]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:22:29.700721 systemd-logind[1712]: Removed session 5. Dec 13 02:22:29.719748 systemd[1]: Started sshd@5-172.31.21.209:22-139.178.68.195:33832.service. Dec 13 02:22:29.880278 sshd[1954]: Accepted publickey for core from 139.178.68.195 port 33832 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:29.881837 sshd[1954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:29.886141 systemd-logind[1712]: New session 6 of user core. Dec 13 02:22:29.887220 systemd[1]: Started session-6.scope. Dec 13 02:22:29.991339 sudo[1958]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:22:29.991646 sudo[1958]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:22:29.996132 sudo[1958]: pam_unix(sudo:session): session closed for user root Dec 13 02:22:30.001901 sudo[1957]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:22:30.002218 sudo[1957]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:22:30.032644 systemd[1]: Stopping audit-rules.service... Dec 13 02:22:30.036000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:22:30.038291 kernel: kauditd_printk_skb: 228 callbacks suppressed Dec 13 02:22:30.038372 kernel: audit: type=1305 audit(1734056550.036:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:22:30.038402 auditctl[1961]: No rules Dec 13 02:22:30.047110 kernel: audit: type=1300 audit(1734056550.036:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff1dcf3d70 a2=420 a3=0 items=0 ppid=1 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.036000 audit[1961]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff1dcf3d70 a2=420 a3=0 items=0 ppid=1 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.038962 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:22:30.039287 systemd[1]: Stopped audit-rules.service. Dec 13 02:22:30.048457 systemd[1]: Starting audit-rules.service... Dec 13 02:22:30.036000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:22:30.053194 kernel: audit: type=1327 audit(1734056550.036:208): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:22:30.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.057457 kernel: audit: type=1131 audit(1734056550.037:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.073449 augenrules[1978]: No rules Dec 13 02:22:30.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.074490 systemd[1]: Finished audit-rules.service. Dec 13 02:22:30.075586 sudo[1957]: pam_unix(sudo:session): session closed for user root Dec 13 02:22:30.074000 audit[1957]: USER_END pid=1957 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.084104 kernel: audit: type=1130 audit(1734056550.073:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.084209 kernel: audit: type=1106 audit(1734056550.074:211): pid=1957 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.084243 kernel: audit: type=1104 audit(1734056550.074:212): pid=1957 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.074000 audit[1957]: CRED_DISP pid=1957 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.098209 sshd[1954]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:30.099000 audit[1954]: USER_END pid=1954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.107334 kernel: audit: type=1106 audit(1734056550.099:213): pid=1954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.103514 systemd-logind[1712]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:22:30.104762 systemd[1]: sshd@5-172.31.21.209:22-139.178.68.195:33832.service: Deactivated successfully. Dec 13 02:22:30.105742 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:22:30.100000 audit[1954]: CRED_DISP pid=1954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.107713 systemd-logind[1712]: Removed session 6. Dec 13 02:22:30.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.209:22-139.178.68.195:33832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.115784 kernel: audit: type=1104 audit(1734056550.100:214): pid=1954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.115864 kernel: audit: type=1131 audit(1734056550.104:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.209:22-139.178.68.195:33832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.124863 systemd[1]: Started sshd@6-172.31.21.209:22-139.178.68.195:33840.service. Dec 13 02:22:30.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.209:22-139.178.68.195:33840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.285000 audit[1984]: USER_ACCT pid=1984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.288256 sshd[1984]: Accepted publickey for core from 139.178.68.195 port 33840 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:30.287000 audit[1984]: CRED_ACQ pid=1984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.288000 audit[1984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc5d0f230 a2=3 a3=0 items=0 ppid=1 pid=1984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.288000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:30.290668 sshd[1984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:30.296630 systemd[1]: Started session-7.scope. Dec 13 02:22:30.297850 systemd-logind[1712]: New session 7 of user core. Dec 13 02:22:30.303000 audit[1984]: USER_START pid=1984 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.305000 audit[1986]: CRED_ACQ pid=1986 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:30.398000 audit[1987]: USER_ACCT pid=1987 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.399999 sudo[1987]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:22:30.399000 audit[1987]: CRED_REFR pid=1987 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.400350 sudo[1987]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:22:30.402000 audit[1987]: USER_START pid=1987 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:30.422993 systemd[1]: Starting coreos-metadata.service... Dec 13 02:22:30.533846 coreos-metadata[1991]: Dec 13 02:22:30.533 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 02:22:30.534580 coreos-metadata[1991]: Dec 13 02:22:30.534 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Dec 13 02:22:30.535320 coreos-metadata[1991]: Dec 13 02:22:30.535 INFO Fetch successful Dec 13 02:22:30.535417 coreos-metadata[1991]: Dec 13 02:22:30.535 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Dec 13 02:22:30.535806 coreos-metadata[1991]: Dec 13 02:22:30.535 INFO Fetch successful Dec 13 02:22:30.535933 coreos-metadata[1991]: Dec 13 02:22:30.535 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Dec 13 02:22:30.536420 coreos-metadata[1991]: Dec 13 02:22:30.536 INFO Fetch successful Dec 13 02:22:30.536554 coreos-metadata[1991]: Dec 13 02:22:30.536 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Dec 13 02:22:30.537089 coreos-metadata[1991]: Dec 13 02:22:30.537 INFO Fetch successful Dec 13 02:22:30.537153 coreos-metadata[1991]: Dec 13 02:22:30.537 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Dec 13 02:22:30.537634 coreos-metadata[1991]: Dec 13 02:22:30.537 INFO Fetch successful Dec 13 02:22:30.537744 coreos-metadata[1991]: Dec 13 02:22:30.537 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Dec 13 02:22:30.538255 coreos-metadata[1991]: Dec 13 02:22:30.538 INFO Fetch successful Dec 13 02:22:30.538451 coreos-metadata[1991]: Dec 13 02:22:30.538 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Dec 13 02:22:30.539446 coreos-metadata[1991]: Dec 13 02:22:30.539 INFO Fetch successful Dec 13 02:22:30.543844 coreos-metadata[1991]: Dec 13 02:22:30.543 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Dec 13 02:22:30.544602 coreos-metadata[1991]: Dec 13 02:22:30.544 INFO Fetch successful Dec 13 02:22:30.554600 systemd[1]: Finished coreos-metadata.service. Dec 13 02:22:30.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:31.637647 systemd[1]: Stopped kubelet.service. Dec 13 02:22:31.637908 systemd[1]: kubelet.service: Consumed 1.120s CPU time. Dec 13 02:22:31.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:31.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:31.640679 systemd[1]: Starting kubelet.service... Dec 13 02:22:31.665989 systemd[1]: Reloading. Dec 13 02:22:31.823323 /usr/lib/systemd/system-generators/torcx-generator[2050]: time="2024-12-13T02:22:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:22:31.823420 /usr/lib/systemd/system-generators/torcx-generator[2050]: time="2024-12-13T02:22:31Z" level=info msg="torcx already run" Dec 13 02:22:31.939238 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:22:31.939260 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:22:31.961939 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.069000 audit: BPF prog-id=49 op=LOAD Dec 13 02:22:32.069000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit: BPF prog-id=50 op=LOAD Dec 13 02:22:32.072000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit: BPF prog-id=51 op=LOAD Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.072000 audit: BPF prog-id=52 op=LOAD Dec 13 02:22:32.072000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:22:32.072000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit: BPF prog-id=53 op=LOAD Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.074000 audit: BPF prog-id=54 op=LOAD Dec 13 02:22:32.074000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:22:32.074000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit: BPF prog-id=55 op=LOAD Dec 13 02:22:32.075000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit: BPF prog-id=56 op=LOAD Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.076000 audit: BPF prog-id=57 op=LOAD Dec 13 02:22:32.076000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:22:32.076000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.077000 audit: BPF prog-id=58 op=LOAD Dec 13 02:22:32.077000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.078000 audit: BPF prog-id=59 op=LOAD Dec 13 02:22:32.078000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit: BPF prog-id=60 op=LOAD Dec 13 02:22:32.080000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit: BPF prog-id=61 op=LOAD Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.080000 audit: BPF prog-id=62 op=LOAD Dec 13 02:22:32.080000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:22:32.080000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit: BPF prog-id=63 op=LOAD Dec 13 02:22:32.082000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit: BPF prog-id=64 op=LOAD Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.082000 audit: BPF prog-id=65 op=LOAD Dec 13 02:22:32.082000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:22:32.082000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:32.087000 audit: BPF prog-id=66 op=LOAD Dec 13 02:22:32.087000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:22:32.130384 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:22:32.130559 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:22:32.130891 systemd[1]: Stopped kubelet.service. Dec 13 02:22:32.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:22:32.132902 systemd[1]: Starting kubelet.service... Dec 13 02:22:32.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:32.858534 systemd[1]: Started kubelet.service. Dec 13 02:22:32.954742 kubelet[2107]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:22:32.954742 kubelet[2107]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:22:32.954742 kubelet[2107]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:22:32.957826 kubelet[2107]: I1213 02:22:32.957650 2107 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:22:33.349466 kubelet[2107]: I1213 02:22:33.349429 2107 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:22:33.349466 kubelet[2107]: I1213 02:22:33.349457 2107 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:22:33.349713 kubelet[2107]: I1213 02:22:33.349693 2107 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:22:33.369297 kubelet[2107]: I1213 02:22:33.369258 2107 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:22:33.381397 kubelet[2107]: I1213 02:22:33.381369 2107 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:22:33.381651 kubelet[2107]: I1213 02:22:33.381618 2107 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:22:33.381865 kubelet[2107]: I1213 02:22:33.381650 2107 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.21.209","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:22:33.382455 kubelet[2107]: I1213 02:22:33.382434 2107 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:22:33.382519 kubelet[2107]: I1213 02:22:33.382459 2107 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:22:33.382617 kubelet[2107]: I1213 02:22:33.382600 2107 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:22:33.383494 kubelet[2107]: I1213 02:22:33.383475 2107 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:22:33.383494 kubelet[2107]: I1213 02:22:33.383496 2107 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:22:33.383620 kubelet[2107]: I1213 02:22:33.383523 2107 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:22:33.383620 kubelet[2107]: I1213 02:22:33.383544 2107 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:22:33.384034 kubelet[2107]: E1213 02:22:33.383979 2107 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:33.386112 kubelet[2107]: E1213 02:22:33.385121 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:33.389254 kubelet[2107]: I1213 02:22:33.389226 2107 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:22:33.391089 kubelet[2107]: I1213 02:22:33.391053 2107 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:22:33.391168 kubelet[2107]: W1213 02:22:33.391126 2107 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:22:33.391810 kubelet[2107]: I1213 02:22:33.391795 2107 server.go:1264] "Started kubelet" Dec 13 02:22:33.401000 audit[2107]: AVC avc: denied { mac_admin } for pid=2107 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:22:33.401000 audit[2107]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007c3e90 a1=c000c8d818 a2=c0007c3e60 a3=25 items=0 ppid=1 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:22:33.401000 audit[2107]: AVC avc: denied { mac_admin } for pid=2107 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:22:33.401000 audit[2107]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000363900 a1=c000c8d830 a2=c0007c3f20 a3=25 items=0 ppid=1 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:22:33.403139 kubelet[2107]: I1213 02:22:33.402446 2107 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:22:33.403139 kubelet[2107]: I1213 02:22:33.402514 2107 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:22:33.403139 kubelet[2107]: I1213 02:22:33.402589 2107 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:22:33.410799 kubelet[2107]: I1213 02:22:33.410734 2107 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:22:33.411741 kubelet[2107]: I1213 02:22:33.411710 2107 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:22:33.412307 kubelet[2107]: I1213 02:22:33.412282 2107 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:22:33.412751 kubelet[2107]: I1213 02:22:33.412700 2107 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:22:33.412959 kubelet[2107]: I1213 02:22:33.412942 2107 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:22:33.413174 kubelet[2107]: I1213 02:22:33.413160 2107 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:22:33.413330 kubelet[2107]: I1213 02:22:33.413308 2107 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:22:33.415692 kubelet[2107]: I1213 02:22:33.415537 2107 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:22:33.415781 kubelet[2107]: I1213 02:22:33.415689 2107 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:22:33.417632 kubelet[2107]: I1213 02:22:33.417611 2107 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:22:33.438803 kubelet[2107]: E1213 02:22:33.438771 2107 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:22:33.439584 kubelet[2107]: W1213 02:22:33.439558 2107 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.21.209" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:22:33.439700 kubelet[2107]: E1213 02:22:33.439593 2107 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.21.209" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:22:33.439754 kubelet[2107]: W1213 02:22:33.439711 2107 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:22:33.439754 kubelet[2107]: E1213 02:22:33.439736 2107 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:22:33.439949 kubelet[2107]: E1213 02:22:33.439921 2107 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.21.209\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 02:22:33.440040 kubelet[2107]: W1213 02:22:33.440018 2107 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 02:22:33.440124 kubelet[2107]: E1213 02:22:33.440051 2107 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 02:22:33.440372 kubelet[2107]: E1213 02:22:33.440269 2107 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.209.18109b3f755ab329 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.209,UID:172.31.21.209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.21.209,},FirstTimestamp:2024-12-13 02:22:33.391764265 +0000 UTC m=+0.523219818,LastTimestamp:2024-12-13 02:22:33.391764265 +0000 UTC m=+0.523219818,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.209,}" Dec 13 02:22:33.445290 kubelet[2107]: I1213 02:22:33.445258 2107 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:22:33.445290 kubelet[2107]: I1213 02:22:33.445289 2107 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:22:33.445490 kubelet[2107]: I1213 02:22:33.445307 2107 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:22:33.450162 kubelet[2107]: I1213 02:22:33.450139 2107 policy_none.go:49] "None policy: Start" Dec 13 02:22:33.453152 kubelet[2107]: I1213 02:22:33.453130 2107 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:22:33.453379 kubelet[2107]: I1213 02:22:33.453366 2107 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:22:33.463683 systemd[1]: Created slice kubepods.slice. Dec 13 02:22:33.472765 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:22:33.475662 kubelet[2107]: E1213 02:22:33.475537 2107 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.209.18109b3f7827bc10 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.209,UID:172.31.21.209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.21.209,},FirstTimestamp:2024-12-13 02:22:33.438755856 +0000 UTC m=+0.570211418,LastTimestamp:2024-12-13 02:22:33.438755856 +0000 UTC m=+0.570211418,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.209,}" Dec 13 02:22:33.488000 audit[2121]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.488000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffca789b10 a2=0 a3=7fffca789afc items=0 ppid=2107 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:22:33.489000 audit[2125]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.489000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe494d29f0 a2=0 a3=7ffe494d29dc items=0 ppid=2107 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:22:33.496093 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:22:33.498855 kubelet[2107]: I1213 02:22:33.498837 2107 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:22:33.498000 audit[2107]: AVC avc: denied { mac_admin } for pid=2107 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.498000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:22:33.498000 audit[2107]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cad050 a1=c000bec5d0 a2=c000cad020 a3=25 items=0 ppid=1 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.499746 kubelet[2107]: I1213 02:22:33.499723 2107 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:22:33.500062 kubelet[2107]: I1213 02:22:33.499984 2107 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:22:33.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:22:33.500732 kubelet[2107]: I1213 02:22:33.500717 2107 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:22:33.503261 kubelet[2107]: E1213 02:22:33.503239 2107 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.21.209\" not found" Dec 13 02:22:33.516099 kubelet[2107]: I1213 02:22:33.516053 2107 kubelet_node_status.go:73] "Attempting to register node" node="172.31.21.209" Dec 13 02:22:33.493000 audit[2127]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.493000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff5fe3f3e0 a2=0 a3=7fff5fe3f3cc items=0 ppid=2107 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:22:33.518000 audit[2132]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.518000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec95d5b50 a2=0 a3=7ffec95d5b3c items=0 ppid=2107 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:22:33.530137 kubelet[2107]: E1213 02:22:33.529961 2107 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.209.18109b3f7878999a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.209,UID:172.31.21.209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.21.209 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.21.209,},FirstTimestamp:2024-12-13 02:22:33.44405545 +0000 UTC m=+0.575511006,LastTimestamp:2024-12-13 02:22:33.44405545 +0000 UTC m=+0.575511006,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.209,}" Dec 13 02:22:33.605974 kubelet[2107]: E1213 02:22:33.602331 2107 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.209.18109b3f7878b970 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.209,UID:172.31.21.209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 172.31.21.209 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:172.31.21.209,},FirstTimestamp:2024-12-13 02:22:33.4440636 +0000 UTC m=+0.575519154,LastTimestamp:2024-12-13 02:22:33.4440636 +0000 UTC m=+0.575519154,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.209,}" Dec 13 02:22:33.606589 kubelet[2107]: E1213 02:22:33.606472 2107 kubelet_node_status.go:96] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.21.209" Dec 13 02:22:33.619000 audit[2137]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.619000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe7d60d6f0 a2=0 a3=7ffe7d60d6dc items=0 ppid=2107 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:22:33.621442 kubelet[2107]: I1213 02:22:33.621389 2107 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:22:33.624000 audit[2138]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:33.624000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc58f934d0 a2=0 a3=7ffc58f934bc items=0 ppid=2107 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:22:33.626192 kubelet[2107]: I1213 02:22:33.625954 2107 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:22:33.626192 kubelet[2107]: I1213 02:22:33.625986 2107 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:22:33.626192 kubelet[2107]: I1213 02:22:33.626021 2107 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:22:33.626192 kubelet[2107]: E1213 02:22:33.626113 2107 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 02:22:33.626000 audit[2139]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.626000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedd38adb0 a2=0 a3=7ffedd38ad9c items=0 ppid=2107 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:22:33.627000 audit[2140]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:33.627000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6b79810 a2=0 a3=7ffeb6b797fc items=0 ppid=2107 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:22:33.628000 audit[2141]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.629000 audit[2142]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:33.629000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffefdea3160 a2=0 a3=7ffefdea314c items=0 ppid=2107 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:22:33.628000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffee9ca140 a2=0 a3=7fffee9ca12c items=0 ppid=2107 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:22:33.630000 audit[2143]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:33.630000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffcaa521a0 a2=0 a3=7fffcaa5218c items=0 ppid=2107 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:22:33.631000 audit[2144]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:33.631000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4e640ef0 a2=0 a3=7ffc4e640edc items=0 ppid=2107 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.631000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:22:33.670285 kubelet[2107]: E1213 02:22:33.670162 2107 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.209.18109b3f78792de4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.209,UID:172.31.21.209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 172.31.21.209 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:172.31.21.209,},FirstTimestamp:2024-12-13 02:22:33.444093412 +0000 UTC m=+0.575548970,LastTimestamp:2024-12-13 02:22:33.444093412 +0000 UTC m=+0.575548970,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.209,}" Dec 13 02:22:33.670885 kubelet[2107]: W1213 02:22:33.670853 2107 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Dec 13 02:22:33.670989 kubelet[2107]: E1213 02:22:33.670899 2107 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Dec 13 02:22:33.671158 kubelet[2107]: E1213 02:22:33.671116 2107 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.21.209\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Dec 13 02:22:33.717848 kubelet[2107]: E1213 02:22:33.717717 2107 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.209.18109b3f7c405c1b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.209,UID:172.31.21.209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:172.31.21.209,},FirstTimestamp:2024-12-13 02:22:33.507478555 +0000 UTC m=+0.638934102,LastTimestamp:2024-12-13 02:22:33.507478555 +0000 UTC m=+0.638934102,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.209,}" Dec 13 02:22:33.808822 kubelet[2107]: I1213 02:22:33.808791 2107 kubelet_node_status.go:73] "Attempting to register node" node="172.31.21.209" Dec 13 02:22:33.816803 kubelet[2107]: I1213 02:22:33.816769 2107 kubelet_node_status.go:76] "Successfully registered node" node="172.31.21.209" Dec 13 02:22:33.845348 kubelet[2107]: E1213 02:22:33.845307 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:33.942000 audit[1987]: USER_END pid=1987 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:33.943907 sudo[1987]: pam_unix(sudo:session): session closed for user root Dec 13 02:22:33.944000 audit[1987]: CRED_DISP pid=1987 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:22:33.946250 kubelet[2107]: E1213 02:22:33.946211 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:33.968664 sshd[1984]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:33.969000 audit[1984]: USER_END pid=1984 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:33.969000 audit[1984]: CRED_DISP pid=1984 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:33.972104 systemd[1]: sshd@6-172.31.21.209:22-139.178.68.195:33840.service: Deactivated successfully. Dec 13 02:22:33.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.209:22-139.178.68.195:33840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:33.973053 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:22:33.973804 systemd-logind[1712]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:22:33.974778 systemd-logind[1712]: Removed session 7. Dec 13 02:22:34.047531 kubelet[2107]: E1213 02:22:34.047492 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.148335 kubelet[2107]: E1213 02:22:34.148286 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.248922 kubelet[2107]: E1213 02:22:34.248798 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.349437 kubelet[2107]: E1213 02:22:34.349394 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.361686 kubelet[2107]: I1213 02:22:34.361646 2107 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 02:22:34.386156 kubelet[2107]: E1213 02:22:34.386115 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:34.450427 kubelet[2107]: E1213 02:22:34.450385 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.552717 kubelet[2107]: E1213 02:22:34.552668 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.653780 kubelet[2107]: E1213 02:22:34.653733 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.754188 kubelet[2107]: E1213 02:22:34.754141 2107 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.209\" not found" Dec 13 02:22:34.855432 kubelet[2107]: I1213 02:22:34.855155 2107 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 02:22:34.855924 env[1717]: time="2024-12-13T02:22:34.855883490Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:22:34.856372 kubelet[2107]: I1213 02:22:34.856108 2107 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 02:22:35.386377 kubelet[2107]: E1213 02:22:35.386338 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:35.386818 kubelet[2107]: I1213 02:22:35.386380 2107 apiserver.go:52] "Watching apiserver" Dec 13 02:22:35.395534 kubelet[2107]: I1213 02:22:35.395470 2107 topology_manager.go:215] "Topology Admit Handler" podUID="30845ad0-1ea6-43d6-b20b-7977fdf9014c" podNamespace="calico-system" podName="calico-node-lpzfj" Dec 13 02:22:35.395713 kubelet[2107]: I1213 02:22:35.395658 2107 topology_manager.go:215] "Topology Admit Handler" podUID="ad9ab561-8c7f-44f7-9cba-e3e80fd206e3" podNamespace="kube-system" podName="kube-proxy-lz54k" Dec 13 02:22:35.395782 kubelet[2107]: I1213 02:22:35.395747 2107 topology_manager.go:215] "Topology Admit Handler" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" podNamespace="calico-system" podName="csi-node-driver-m2pph" Dec 13 02:22:35.395968 kubelet[2107]: E1213 02:22:35.395941 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:35.405178 systemd[1]: Created slice kubepods-besteffort-pod30845ad0_1ea6_43d6_b20b_7977fdf9014c.slice. Dec 13 02:22:35.414948 systemd[1]: Created slice kubepods-besteffort-podad9ab561_8c7f_44f7_9cba_e3e80fd206e3.slice. Dec 13 02:22:35.415421 kubelet[2107]: I1213 02:22:35.415343 2107 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:22:35.425212 kubelet[2107]: I1213 02:22:35.425175 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6f699b5e-b2f5-4f21-9ab6-c6f4139ec319-registration-dir\") pod \"csi-node-driver-m2pph\" (UID: \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\") " pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:35.425392 kubelet[2107]: I1213 02:22:35.425225 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/30845ad0-1ea6-43d6-b20b-7977fdf9014c-node-certs\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425392 kubelet[2107]: I1213 02:22:35.425273 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-cni-bin-dir\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425392 kubelet[2107]: I1213 02:22:35.425301 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-flexvol-driver-host\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425392 kubelet[2107]: I1213 02:22:35.425336 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6f699b5e-b2f5-4f21-9ab6-c6f4139ec319-varrun\") pod \"csi-node-driver-m2pph\" (UID: \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\") " pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:35.425392 kubelet[2107]: I1213 02:22:35.425357 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6f699b5e-b2f5-4f21-9ab6-c6f4139ec319-socket-dir\") pod \"csi-node-driver-m2pph\" (UID: \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\") " pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:35.425695 kubelet[2107]: I1213 02:22:35.425398 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-lib-modules\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425695 kubelet[2107]: I1213 02:22:35.425423 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/30845ad0-1ea6-43d6-b20b-7977fdf9014c-tigera-ca-bundle\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425695 kubelet[2107]: I1213 02:22:35.425455 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-var-lib-calico\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425695 kubelet[2107]: I1213 02:22:35.425483 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ad9ab561-8c7f-44f7-9cba-e3e80fd206e3-xtables-lock\") pod \"kube-proxy-lz54k\" (UID: \"ad9ab561-8c7f-44f7-9cba-e3e80fd206e3\") " pod="kube-system/kube-proxy-lz54k" Dec 13 02:22:35.425695 kubelet[2107]: I1213 02:22:35.425508 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-xtables-lock\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425962 kubelet[2107]: I1213 02:22:35.425529 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-policysync\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425962 kubelet[2107]: I1213 02:22:35.425558 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-var-run-calico\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425962 kubelet[2107]: I1213 02:22:35.425605 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-cni-net-dir\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425962 kubelet[2107]: I1213 02:22:35.425701 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t2mrs\" (UniqueName: \"kubernetes.io/projected/30845ad0-1ea6-43d6-b20b-7977fdf9014c-kube-api-access-t2mrs\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.425962 kubelet[2107]: I1213 02:22:35.425769 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ad9ab561-8c7f-44f7-9cba-e3e80fd206e3-lib-modules\") pod \"kube-proxy-lz54k\" (UID: \"ad9ab561-8c7f-44f7-9cba-e3e80fd206e3\") " pod="kube-system/kube-proxy-lz54k" Dec 13 02:22:35.426200 kubelet[2107]: I1213 02:22:35.425795 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6f699b5e-b2f5-4f21-9ab6-c6f4139ec319-kubelet-dir\") pod \"csi-node-driver-m2pph\" (UID: \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\") " pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:35.426200 kubelet[2107]: I1213 02:22:35.425821 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6j6v\" (UniqueName: \"kubernetes.io/projected/6f699b5e-b2f5-4f21-9ab6-c6f4139ec319-kube-api-access-z6j6v\") pod \"csi-node-driver-m2pph\" (UID: \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\") " pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:35.426200 kubelet[2107]: I1213 02:22:35.425844 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/30845ad0-1ea6-43d6-b20b-7977fdf9014c-cni-log-dir\") pod \"calico-node-lpzfj\" (UID: \"30845ad0-1ea6-43d6-b20b-7977fdf9014c\") " pod="calico-system/calico-node-lpzfj" Dec 13 02:22:35.426200 kubelet[2107]: I1213 02:22:35.425867 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ad9ab561-8c7f-44f7-9cba-e3e80fd206e3-kube-proxy\") pod \"kube-proxy-lz54k\" (UID: \"ad9ab561-8c7f-44f7-9cba-e3e80fd206e3\") " pod="kube-system/kube-proxy-lz54k" Dec 13 02:22:35.426200 kubelet[2107]: I1213 02:22:35.425898 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r9v72\" (UniqueName: \"kubernetes.io/projected/ad9ab561-8c7f-44f7-9cba-e3e80fd206e3-kube-api-access-r9v72\") pod \"kube-proxy-lz54k\" (UID: \"ad9ab561-8c7f-44f7-9cba-e3e80fd206e3\") " pod="kube-system/kube-proxy-lz54k" Dec 13 02:22:35.529397 kubelet[2107]: E1213 02:22:35.529367 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.529628 kubelet[2107]: W1213 02:22:35.529608 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.529758 kubelet[2107]: E1213 02:22:35.529733 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.530489 kubelet[2107]: E1213 02:22:35.530471 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.530620 kubelet[2107]: W1213 02:22:35.530604 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.530715 kubelet[2107]: E1213 02:22:35.530702 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.531002 kubelet[2107]: E1213 02:22:35.530991 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.531111 kubelet[2107]: W1213 02:22:35.531097 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.531205 kubelet[2107]: E1213 02:22:35.531192 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.531509 kubelet[2107]: E1213 02:22:35.531496 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.531599 kubelet[2107]: W1213 02:22:35.531587 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.531683 kubelet[2107]: E1213 02:22:35.531664 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.532012 kubelet[2107]: E1213 02:22:35.531998 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.532221 kubelet[2107]: W1213 02:22:35.532206 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.532331 kubelet[2107]: E1213 02:22:35.532318 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.532684 kubelet[2107]: E1213 02:22:35.532671 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.532783 kubelet[2107]: W1213 02:22:35.532771 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.537022 kubelet[2107]: E1213 02:22:35.532853 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.537429 kubelet[2107]: E1213 02:22:35.537414 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.537536 kubelet[2107]: W1213 02:22:35.537523 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.537730 kubelet[2107]: E1213 02:22:35.537708 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.538378 kubelet[2107]: E1213 02:22:35.538338 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.538474 kubelet[2107]: W1213 02:22:35.538462 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.538617 kubelet[2107]: E1213 02:22:35.538604 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.539182 kubelet[2107]: E1213 02:22:35.539154 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.539283 kubelet[2107]: W1213 02:22:35.539270 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.539379 kubelet[2107]: E1213 02:22:35.539367 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.539646 kubelet[2107]: E1213 02:22:35.539635 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.540151 kubelet[2107]: W1213 02:22:35.540127 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.540228 kubelet[2107]: E1213 02:22:35.540152 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.540411 kubelet[2107]: E1213 02:22:35.540398 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.540483 kubelet[2107]: W1213 02:22:35.540420 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.540543 kubelet[2107]: E1213 02:22:35.540517 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.540717 kubelet[2107]: E1213 02:22:35.540693 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.540790 kubelet[2107]: W1213 02:22:35.540717 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.540846 kubelet[2107]: E1213 02:22:35.540809 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.540962 kubelet[2107]: E1213 02:22:35.540947 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.540962 kubelet[2107]: W1213 02:22:35.540960 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.541113 kubelet[2107]: E1213 02:22:35.541041 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.541217 kubelet[2107]: E1213 02:22:35.541200 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.541217 kubelet[2107]: W1213 02:22:35.541213 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.541353 kubelet[2107]: E1213 02:22:35.541297 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.541439 kubelet[2107]: E1213 02:22:35.541420 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.541439 kubelet[2107]: W1213 02:22:35.541434 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.541561 kubelet[2107]: E1213 02:22:35.541512 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.541657 kubelet[2107]: E1213 02:22:35.541638 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.541657 kubelet[2107]: W1213 02:22:35.541651 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.541792 kubelet[2107]: E1213 02:22:35.541751 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.541895 kubelet[2107]: E1213 02:22:35.541878 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.541895 kubelet[2107]: W1213 02:22:35.541892 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.542019 kubelet[2107]: E1213 02:22:35.541970 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.542128 kubelet[2107]: E1213 02:22:35.542105 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.542128 kubelet[2107]: W1213 02:22:35.542118 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.542333 kubelet[2107]: E1213 02:22:35.542255 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.542402 kubelet[2107]: E1213 02:22:35.542384 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.542402 kubelet[2107]: W1213 02:22:35.542399 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.542531 kubelet[2107]: E1213 02:22:35.542478 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.542620 kubelet[2107]: E1213 02:22:35.542598 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.542620 kubelet[2107]: W1213 02:22:35.542611 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.542731 kubelet[2107]: E1213 02:22:35.542687 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.542883 kubelet[2107]: E1213 02:22:35.542859 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.542965 kubelet[2107]: W1213 02:22:35.542937 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.543072 kubelet[2107]: E1213 02:22:35.543056 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.543191 kubelet[2107]: E1213 02:22:35.543178 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.543243 kubelet[2107]: W1213 02:22:35.543192 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.543348 kubelet[2107]: E1213 02:22:35.543335 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.543445 kubelet[2107]: E1213 02:22:35.543401 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.543525 kubelet[2107]: W1213 02:22:35.543447 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.543645 kubelet[2107]: E1213 02:22:35.543629 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.543713 kubelet[2107]: W1213 02:22:35.543648 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.543765 kubelet[2107]: E1213 02:22:35.543621 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.543765 kubelet[2107]: E1213 02:22:35.543742 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.543968 kubelet[2107]: E1213 02:22:35.543948 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.543968 kubelet[2107]: W1213 02:22:35.543965 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.544189 kubelet[2107]: E1213 02:22:35.544049 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.544335 kubelet[2107]: E1213 02:22:35.544318 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.544335 kubelet[2107]: W1213 02:22:35.544332 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.544496 kubelet[2107]: E1213 02:22:35.544474 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.544569 kubelet[2107]: E1213 02:22:35.544557 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.544622 kubelet[2107]: W1213 02:22:35.544580 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.544712 kubelet[2107]: E1213 02:22:35.544700 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.544795 kubelet[2107]: E1213 02:22:35.544783 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.544850 kubelet[2107]: W1213 02:22:35.544797 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.544953 kubelet[2107]: E1213 02:22:35.544941 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.545045 kubelet[2107]: E1213 02:22:35.545001 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.545174 kubelet[2107]: W1213 02:22:35.545153 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.545263 kubelet[2107]: E1213 02:22:35.545247 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.545852 kubelet[2107]: E1213 02:22:35.545826 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.545852 kubelet[2107]: W1213 02:22:35.545850 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.545987 kubelet[2107]: E1213 02:22:35.545978 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.546569 kubelet[2107]: E1213 02:22:35.546551 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.546569 kubelet[2107]: W1213 02:22:35.546566 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.546713 kubelet[2107]: E1213 02:22:35.546677 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.546852 kubelet[2107]: E1213 02:22:35.546835 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.546922 kubelet[2107]: W1213 02:22:35.546849 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.547006 kubelet[2107]: E1213 02:22:35.546987 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.547160 kubelet[2107]: E1213 02:22:35.547143 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.547160 kubelet[2107]: W1213 02:22:35.547157 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.547317 kubelet[2107]: E1213 02:22:35.547302 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.547393 kubelet[2107]: E1213 02:22:35.547383 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.547448 kubelet[2107]: W1213 02:22:35.547393 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.547541 kubelet[2107]: E1213 02:22:35.547528 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.547616 kubelet[2107]: E1213 02:22:35.547605 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.547673 kubelet[2107]: W1213 02:22:35.547617 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.547750 kubelet[2107]: E1213 02:22:35.547732 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.547853 kubelet[2107]: E1213 02:22:35.547842 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.547910 kubelet[2107]: W1213 02:22:35.547855 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.548149 kubelet[2107]: E1213 02:22:35.548128 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.548302 kubelet[2107]: E1213 02:22:35.548284 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.548381 kubelet[2107]: W1213 02:22:35.548309 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.548471 kubelet[2107]: E1213 02:22:35.548456 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.548682 kubelet[2107]: E1213 02:22:35.548507 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.548851 kubelet[2107]: W1213 02:22:35.548820 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.548851 kubelet[2107]: E1213 02:22:35.548839 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.565494 kubelet[2107]: E1213 02:22:35.565459 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.565494 kubelet[2107]: W1213 02:22:35.565484 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.565943 kubelet[2107]: E1213 02:22:35.565506 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.636646 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.640829 kubelet[2107]: W1213 02:22:35.636667 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.636689 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.637076 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.640829 kubelet[2107]: W1213 02:22:35.637105 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.637124 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.637508 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.640829 kubelet[2107]: W1213 02:22:35.637519 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.637570 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.640829 kubelet[2107]: E1213 02:22:35.637837 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.641557 kubelet[2107]: W1213 02:22:35.637846 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.641557 kubelet[2107]: E1213 02:22:35.637897 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.641557 kubelet[2107]: E1213 02:22:35.638153 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.641557 kubelet[2107]: W1213 02:22:35.638162 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.641557 kubelet[2107]: E1213 02:22:35.638179 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.641557 kubelet[2107]: E1213 02:22:35.638583 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.641557 kubelet[2107]: W1213 02:22:35.638622 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.641557 kubelet[2107]: E1213 02:22:35.638640 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.641557 kubelet[2107]: E1213 02:22:35.638893 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.641557 kubelet[2107]: W1213 02:22:35.638902 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.639057 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.639229 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.642394 kubelet[2107]: W1213 02:22:35.639237 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.639252 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.639912 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.642394 kubelet[2107]: W1213 02:22:35.639923 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.639989 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.640721 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.642394 kubelet[2107]: W1213 02:22:35.640734 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.642394 kubelet[2107]: E1213 02:22:35.640747 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.680343 kubelet[2107]: E1213 02:22:35.680318 2107 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:35.680610 kubelet[2107]: W1213 02:22:35.680519 2107 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:35.680610 kubelet[2107]: E1213 02:22:35.680601 2107 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:35.714826 env[1717]: time="2024-12-13T02:22:35.714739609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lpzfj,Uid:30845ad0-1ea6-43d6-b20b-7977fdf9014c,Namespace:calico-system,Attempt:0,}" Dec 13 02:22:35.719993 env[1717]: time="2024-12-13T02:22:35.719949901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lz54k,Uid:ad9ab561-8c7f-44f7-9cba-e3e80fd206e3,Namespace:kube-system,Attempt:0,}" Dec 13 02:22:36.324973 env[1717]: time="2024-12-13T02:22:36.324922448Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.330411 env[1717]: time="2024-12-13T02:22:36.330358649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.332118 env[1717]: time="2024-12-13T02:22:36.332065196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.336902 env[1717]: time="2024-12-13T02:22:36.336862007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.338196 env[1717]: time="2024-12-13T02:22:36.338164069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.339265 env[1717]: time="2024-12-13T02:22:36.339237538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.341410 env[1717]: time="2024-12-13T02:22:36.341378980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.349310 env[1717]: time="2024-12-13T02:22:36.349267322Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.371196 env[1717]: time="2024-12-13T02:22:36.366534344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:36.371196 env[1717]: time="2024-12-13T02:22:36.366566707Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:36.371196 env[1717]: time="2024-12-13T02:22:36.366580491Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:36.371196 env[1717]: time="2024-12-13T02:22:36.366720835Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be pid=2208 runtime=io.containerd.runc.v2 Dec 13 02:22:36.377341 env[1717]: time="2024-12-13T02:22:36.377237839Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:36.377552 env[1717]: time="2024-12-13T02:22:36.377523559Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:36.377668 env[1717]: time="2024-12-13T02:22:36.377644791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:36.378137 env[1717]: time="2024-12-13T02:22:36.378017436Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/330293107b782d783f74e2baf63c68bce3ebc6d92c4b24914c849f0591e433d1 pid=2225 runtime=io.containerd.runc.v2 Dec 13 02:22:36.387763 kubelet[2107]: E1213 02:22:36.387410 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:36.398686 systemd[1]: Started cri-containerd-9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be.scope. Dec 13 02:22:36.428121 kernel: kauditd_printk_skb: 275 callbacks suppressed Dec 13 02:22:36.428254 kernel: audit: type=1400 audit(1734056556.418:456): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.428296 kernel: audit: type=1400 audit(1734056556.418:457): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.432532 kernel: audit: type=1400 audit(1734056556.418:458): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.438275 kernel: audit: type=1400 audit(1734056556.418:459): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.441231 systemd[1]: Started cri-containerd-330293107b782d783f74e2baf63c68bce3ebc6d92c4b24914c849f0591e433d1.scope. Dec 13 02:22:36.449177 kernel: audit: type=1400 audit(1734056556.418:460): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.457160 kernel: audit: type=1400 audit(1734056556.418:461): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.457280 kernel: audit: type=1400 audit(1734056556.418:462): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.465112 kernel: audit: type=1400 audit(1734056556.418:463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.471119 kernel: audit: type=1400 audit(1734056556.418:464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.471188 env[1717]: time="2024-12-13T02:22:36.468141441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lpzfj,Uid:30845ad0-1ea6-43d6-b20b-7977fdf9014c,Namespace:calico-system,Attempt:0,} returns sandbox id \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\"" Dec 13 02:22:36.471958 env[1717]: time="2024-12-13T02:22:36.471918763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:22:36.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.423000 audit: BPF prog-id=67 op=LOAD Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2208 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.479175 kernel: audit: type=1400 audit(1734056556.423:465): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323931383365343731666133333836373764363866373332313662 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2208 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323931383365343731666133333836373764363866373332313662 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.424000 audit: BPF prog-id=68 op=LOAD Dec 13 02:22:36.424000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024a80 items=0 ppid=2208 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323931383365343731666133333836373764363866373332313662 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit: BPF prog-id=69 op=LOAD Dec 13 02:22:36.427000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ac8 items=0 ppid=2208 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323931383365343731666133333836373764363866373332313662 Dec 13 02:22:36.427000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:22:36.427000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.427000 audit: BPF prog-id=70 op=LOAD Dec 13 02:22:36.427000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ed8 items=0 ppid=2208 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323931383365343731666133333836373764363866373332313662 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.481000 audit: BPF prog-id=71 op=LOAD Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2225 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303239333130376237383264373833663734653262616636336336 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2225 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303239333130376237383264373833663734653262616636336336 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit: BPF prog-id=72 op=LOAD Dec 13 02:22:36.482000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000385b90 items=0 ppid=2225 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303239333130376237383264373833663734653262616636336336 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit: BPF prog-id=73 op=LOAD Dec 13 02:22:36.482000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000385bd8 items=0 ppid=2225 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303239333130376237383264373833663734653262616636336336 Dec 13 02:22:36.482000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:22:36.482000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.482000 audit: BPF prog-id=74 op=LOAD Dec 13 02:22:36.482000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000385fe8 items=0 ppid=2225 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303239333130376237383264373833663734653262616636336336 Dec 13 02:22:36.501581 env[1717]: time="2024-12-13T02:22:36.501532045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lz54k,Uid:ad9ab561-8c7f-44f7-9cba-e3e80fd206e3,Namespace:kube-system,Attempt:0,} returns sandbox id \"330293107b782d783f74e2baf63c68bce3ebc6d92c4b24914c849f0591e433d1\"" Dec 13 02:22:36.539936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2871451780.mount: Deactivated successfully. Dec 13 02:22:36.630451 kubelet[2107]: E1213 02:22:36.626799 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:37.388185 kubelet[2107]: E1213 02:22:37.388137 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:37.669521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount275389898.mount: Deactivated successfully. Dec 13 02:22:37.850800 env[1717]: time="2024-12-13T02:22:37.850697882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:37.854385 env[1717]: time="2024-12-13T02:22:37.854344870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:37.856646 env[1717]: time="2024-12-13T02:22:37.856604047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:37.859594 env[1717]: time="2024-12-13T02:22:37.859559458Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:37.860058 env[1717]: time="2024-12-13T02:22:37.860024452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:22:37.862352 env[1717]: time="2024-12-13T02:22:37.862325833Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:22:37.863179 env[1717]: time="2024-12-13T02:22:37.863149529Z" level=info msg="CreateContainer within sandbox \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:22:37.882711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1444452742.mount: Deactivated successfully. Dec 13 02:22:37.893911 env[1717]: time="2024-12-13T02:22:37.893861023Z" level=info msg="CreateContainer within sandbox \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4\"" Dec 13 02:22:37.894841 env[1717]: time="2024-12-13T02:22:37.894809024Z" level=info msg="StartContainer for \"0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4\"" Dec 13 02:22:37.920702 systemd[1]: Started cri-containerd-0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4.scope. Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f306a56a228 items=0 ppid=2208 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:37.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643065336465333536353534626266343363353365666561636135 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.945000 audit: BPF prog-id=75 op=LOAD Dec 13 02:22:37.945000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002c5f98 items=0 ppid=2208 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:37.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643065336465333536353534626266343363353365666561636135 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.946000 audit: BPF prog-id=76 op=LOAD Dec 13 02:22:37.946000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002c5fe8 items=0 ppid=2208 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:37.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643065336465333536353534626266343363353365666561636135 Dec 13 02:22:37.948000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:22:37.948000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:37.948000 audit: BPF prog-id=77 op=LOAD Dec 13 02:22:37.948000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00038e078 items=0 ppid=2208 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:37.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643065336465333536353534626266343363353365666561636135 Dec 13 02:22:37.972586 env[1717]: time="2024-12-13T02:22:37.972486581Z" level=info msg="StartContainer for \"0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4\" returns successfully" Dec 13 02:22:37.983786 systemd[1]: cri-containerd-0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4.scope: Deactivated successfully. Dec 13 02:22:37.986000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:22:38.100114 env[1717]: time="2024-12-13T02:22:38.100032634Z" level=info msg="shim disconnected" id=0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4 Dec 13 02:22:38.100114 env[1717]: time="2024-12-13T02:22:38.100106528Z" level=warning msg="cleaning up after shim disconnected" id=0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4 namespace=k8s.io Dec 13 02:22:38.100114 env[1717]: time="2024-12-13T02:22:38.100120384Z" level=info msg="cleaning up dead shim" Dec 13 02:22:38.110229 env[1717]: time="2024-12-13T02:22:38.110159803Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:22:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2329 runtime=io.containerd.runc.v2\n" Dec 13 02:22:38.388543 kubelet[2107]: E1213 02:22:38.388487 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:38.609037 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0ad0e3de356554bbf43c53efeaca5d0604f9309761ec85c546ac997c6ba316b4-rootfs.mount: Deactivated successfully. Dec 13 02:22:38.626946 kubelet[2107]: E1213 02:22:38.626896 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:39.157890 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1510176547.mount: Deactivated successfully. Dec 13 02:22:39.389481 kubelet[2107]: E1213 02:22:39.389437 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:39.887662 env[1717]: time="2024-12-13T02:22:39.887610451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:39.890448 env[1717]: time="2024-12-13T02:22:39.890403935Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:39.892656 env[1717]: time="2024-12-13T02:22:39.892618020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:39.894907 env[1717]: time="2024-12-13T02:22:39.894868895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:39.895516 env[1717]: time="2024-12-13T02:22:39.895421827Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:22:39.898280 env[1717]: time="2024-12-13T02:22:39.897792602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:22:39.898501 env[1717]: time="2024-12-13T02:22:39.898469403Z" level=info msg="CreateContainer within sandbox \"330293107b782d783f74e2baf63c68bce3ebc6d92c4b24914c849f0591e433d1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:22:39.928214 env[1717]: time="2024-12-13T02:22:39.928156644Z" level=info msg="CreateContainer within sandbox \"330293107b782d783f74e2baf63c68bce3ebc6d92c4b24914c849f0591e433d1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"153b9c87bb61de0c0190158400c2160373846d693675a51e8d791afa05f2bc23\"" Dec 13 02:22:39.928739 env[1717]: time="2024-12-13T02:22:39.928702598Z" level=info msg="StartContainer for \"153b9c87bb61de0c0190158400c2160373846d693675a51e8d791afa05f2bc23\"" Dec 13 02:22:39.963112 systemd[1]: Started cri-containerd-153b9c87bb61de0c0190158400c2160373846d693675a51e8d791afa05f2bc23.scope. Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f8cec5dd8f8 items=0 ppid=2225 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:39.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135336239633837626236316465306330313930313538343030633231 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit: BPF prog-id=78 op=LOAD Dec 13 02:22:39.989000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00017d018 items=0 ppid=2225 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:39.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135336239633837626236316465306330313930313538343030633231 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit: BPF prog-id=79 op=LOAD Dec 13 02:22:39.989000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00017d068 items=0 ppid=2225 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:39.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135336239633837626236316465306330313930313538343030633231 Dec 13 02:22:39.989000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:22:39.989000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:39.989000 audit: BPF prog-id=80 op=LOAD Dec 13 02:22:39.989000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00017d0f8 items=0 ppid=2225 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:39.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135336239633837626236316465306330313930313538343030633231 Dec 13 02:22:40.041151 env[1717]: time="2024-12-13T02:22:40.039093790Z" level=info msg="StartContainer for \"153b9c87bb61de0c0190158400c2160373846d693675a51e8d791afa05f2bc23\" returns successfully" Dec 13 02:22:40.119000 audit[2404]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.119000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd02ee4f30 a2=0 a3=7ffd02ee4f1c items=0 ppid=2364 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:22:40.121000 audit[2405]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.121000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb34d1cc0 a2=0 a3=7ffdb34d1cac items=0 ppid=2364 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:22:40.121000 audit[2406]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.121000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3d04a730 a2=0 a3=7ffe3d04a71c items=0 ppid=2364 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:22:40.122000 audit[2407]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.122000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec0f198e0 a2=0 a3=7ffec0f198cc items=0 ppid=2364 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:22:40.124000 audit[2408]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.124000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd1eb0990 a2=0 a3=7ffcd1eb097c items=0 ppid=2364 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:22:40.126000 audit[2409]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.126000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff56099b40 a2=0 a3=7fff56099b2c items=0 ppid=2364 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:22:40.220000 audit[2410]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.220000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc7b340560 a2=0 a3=7ffc7b34054c items=0 ppid=2364 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:22:40.225000 audit[2412]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.225000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd0afd9ad0 a2=0 a3=7ffd0afd9abc items=0 ppid=2364 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:22:40.231000 audit[2415]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.231000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeebc112c0 a2=0 a3=7ffeebc112ac items=0 ppid=2364 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:22:40.232000 audit[2416]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.232000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3ae76370 a2=0 a3=7fff3ae7635c items=0 ppid=2364 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:22:40.235000 audit[2418]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.235000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde48e3eb0 a2=0 a3=7ffde48e3e9c items=0 ppid=2364 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:22:40.243000 audit[2419]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.243000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff25e294a0 a2=0 a3=7fff25e2948c items=0 ppid=2364 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:22:40.257000 audit[2421]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.257000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5e279210 a2=0 a3=7ffd5e2791fc items=0 ppid=2364 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:22:40.282000 audit[2424]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.282000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc402cd490 a2=0 a3=7ffc402cd47c items=0 ppid=2364 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:22:40.284000 audit[2425]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.284000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff491eec30 a2=0 a3=7fff491eec1c items=0 ppid=2364 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:22:40.287000 audit[2427]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.287000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff84641ce0 a2=0 a3=7fff84641ccc items=0 ppid=2364 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:22:40.288000 audit[2428]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.288000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda3093300 a2=0 a3=7ffda30932ec items=0 ppid=2364 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:22:40.292000 audit[2430]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.292000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc77affc30 a2=0 a3=7ffc77affc1c items=0 ppid=2364 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:22:40.296000 audit[2433]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.296000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf6862600 a2=0 a3=7ffdf68625ec items=0 ppid=2364 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:22:40.301000 audit[2436]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.301000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe96907eb0 a2=0 a3=7ffe96907e9c items=0 ppid=2364 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:22:40.302000 audit[2437]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.302000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd05e6cb10 a2=0 a3=7ffd05e6cafc items=0 ppid=2364 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:22:40.305000 audit[2439]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.305000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc84f4adb0 a2=0 a3=7ffc84f4ad9c items=0 ppid=2364 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:22:40.348000 audit[2444]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.348000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd2cb36760 a2=0 a3=7ffd2cb3674c items=0 ppid=2364 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:22:40.350000 audit[2445]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.350000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc98a1b0a0 a2=0 a3=7ffc98a1b08c items=0 ppid=2364 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:22:40.353000 audit[2447]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:22:40.353000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd982d3e30 a2=0 a3=7ffd982d3e1c items=0 ppid=2364 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:22:40.375000 audit[2453]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:40.375000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc74832cf0 a2=0 a3=7ffc74832cdc items=0 ppid=2364 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:40.389773 kubelet[2107]: E1213 02:22:40.389735 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:40.419000 audit[2453]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:40.419000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffc74832cf0 a2=0 a3=7ffc74832cdc items=0 ppid=2364 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:40.433000 audit[2462]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.433000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdfb69a500 a2=0 a3=7ffdfb69a4ec items=0 ppid=2364 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:22:40.437000 audit[2464]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.437000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5953cac0 a2=0 a3=7ffe5953caac items=0 ppid=2364 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:22:40.442000 audit[2467]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.442000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe04183040 a2=0 a3=7ffe0418302c items=0 ppid=2364 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:22:40.443000 audit[2468]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.443000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe210e4b60 a2=0 a3=7ffe210e4b4c items=0 ppid=2364 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:22:40.446000 audit[2470]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.446000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9bd2f900 a2=0 a3=7fff9bd2f8ec items=0 ppid=2364 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:22:40.447000 audit[2471]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.447000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff8bef960 a2=0 a3=7ffff8bef94c items=0 ppid=2364 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:22:40.451000 audit[2473]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.451000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd72783420 a2=0 a3=7ffd7278340c items=0 ppid=2364 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:22:40.455000 audit[2476]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.455000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe15e18e40 a2=0 a3=7ffe15e18e2c items=0 ppid=2364 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:22:40.457000 audit[2477]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.457000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefdbc4720 a2=0 a3=7ffefdbc470c items=0 ppid=2364 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:22:40.459000 audit[2479]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.459000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0c409460 a2=0 a3=7ffe0c40944c items=0 ppid=2364 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:22:40.461000 audit[2480]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.461000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffae7a6d90 a2=0 a3=7fffae7a6d7c items=0 ppid=2364 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:22:40.464000 audit[2482]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.464000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd1bf1370 a2=0 a3=7ffcd1bf135c items=0 ppid=2364 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:22:40.470000 audit[2485]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.470000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff27d2fea0 a2=0 a3=7fff27d2fe8c items=0 ppid=2364 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:22:40.474000 audit[2488]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.474000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0094daa0 a2=0 a3=7ffc0094da8c items=0 ppid=2364 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:22:40.476000 audit[2489]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.476000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcee122650 a2=0 a3=7ffcee12263c items=0 ppid=2364 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:22:40.480000 audit[2491]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.480000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffbb596050 a2=0 a3=7fffbb59603c items=0 ppid=2364 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:22:40.484000 audit[2494]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.484000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0e7b8130 a2=0 a3=7fff0e7b811c items=0 ppid=2364 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:22:40.485000 audit[2495]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.485000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4f9ace10 a2=0 a3=7ffc4f9acdfc items=0 ppid=2364 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:22:40.488000 audit[2497]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.488000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd22fe7cf0 a2=0 a3=7ffd22fe7cdc items=0 ppid=2364 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:22:40.489000 audit[2498]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.489000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc6511c50 a2=0 a3=7ffcc6511c3c items=0 ppid=2364 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:22:40.492000 audit[2500]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.492000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7610b1e0 a2=0 a3=7ffe7610b1cc items=0 ppid=2364 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:22:40.497000 audit[2503]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:22:40.497000 audit[2503]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff109dde30 a2=0 a3=7fff109dde1c items=0 ppid=2364 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:22:40.501000 audit[2505]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:22:40.501000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc7cd73db0 a2=0 a3=7ffc7cd73d9c items=0 ppid=2364 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.501000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:40.501000 audit[2505]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:22:40.501000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc7cd73db0 a2=0 a3=7ffc7cd73d9c items=0 ppid=2364 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.501000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:40.627327 kubelet[2107]: E1213 02:22:40.627265 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:40.911989 systemd[1]: run-containerd-runc-k8s.io-153b9c87bb61de0c0190158400c2160373846d693675a51e8d791afa05f2bc23-runc.gsK8Xz.mount: Deactivated successfully. Dec 13 02:22:41.390846 kubelet[2107]: E1213 02:22:41.390708 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:41.575000 audit[2507]: NETFILTER_CFG table=filter:65 family=2 entries=10 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:41.592645 kernel: kauditd_printk_skb: 344 callbacks suppressed Dec 13 02:22:41.592778 kernel: audit: type=1325 audit(1734056561.575:556): table=filter:65 family=2 entries=10 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:41.592806 kernel: audit: type=1300 audit(1734056561.575:556): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe4690c6e0 a2=0 a3=7ffe4690c6cc items=0 ppid=2364 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.592827 kernel: audit: type=1327 audit(1734056561.575:556): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:41.575000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe4690c6e0 a2=0 a3=7ffe4690c6cc items=0 ppid=2364 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:41.593000 audit[2507]: NETFILTER_CFG table=nat:66 family=2 entries=20 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:41.593000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe4690c6e0 a2=0 a3=7ffe4690c6cc items=0 ppid=2364 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.603171 kernel: audit: type=1325 audit(1734056561.593:557): table=nat:66 family=2 entries=20 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:41.603266 kernel: audit: type=1300 audit(1734056561.593:557): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe4690c6e0 a2=0 a3=7ffe4690c6cc items=0 ppid=2364 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:41.606100 kernel: audit: type=1327 audit(1734056561.593:557): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:42.391881 kubelet[2107]: E1213 02:22:42.391812 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:42.626915 kubelet[2107]: E1213 02:22:42.626866 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:43.393051 kubelet[2107]: E1213 02:22:43.392981 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:43.803567 amazon-ssm-agent[1780]: 2024-12-13 02:22:43 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 02:22:44.335549 env[1717]: time="2024-12-13T02:22:44.335462812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:44.339640 env[1717]: time="2024-12-13T02:22:44.339599551Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:44.341996 env[1717]: time="2024-12-13T02:22:44.341960989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:44.344684 env[1717]: time="2024-12-13T02:22:44.344442662Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:44.345351 env[1717]: time="2024-12-13T02:22:44.345313726Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:22:44.348999 env[1717]: time="2024-12-13T02:22:44.348960042Z" level=info msg="CreateContainer within sandbox \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:22:44.370099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2218059951.mount: Deactivated successfully. Dec 13 02:22:44.378342 env[1717]: time="2024-12-13T02:22:44.378285675Z" level=info msg="CreateContainer within sandbox \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23\"" Dec 13 02:22:44.379136 env[1717]: time="2024-12-13T02:22:44.379100154Z" level=info msg="StartContainer for \"113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23\"" Dec 13 02:22:44.393928 kubelet[2107]: E1213 02:22:44.393799 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:44.427349 systemd[1]: Started cri-containerd-113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23.scope. Dec 13 02:22:44.479015 kernel: audit: type=1400 audit(1734056564.460:558): avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.479215 kernel: audit: type=1300 audit(1734056564.460:558): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f10cf34e498 items=0 ppid=2208 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f10cf34e498 items=0 ppid=2208 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:44.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336536343037393865313464666337383936383335666132316333 Dec 13 02:22:44.489152 kernel: audit: type=1327 audit(1734056564.460:558): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336536343037393865313464666337383936383335666132316333 Dec 13 02:22:44.489280 kernel: audit: type=1400 audit(1734056564.460:559): avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.460000 audit: BPF prog-id=81 op=LOAD Dec 13 02:22:44.460000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000386898 items=0 ppid=2208 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:44.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336536343037393865313464666337383936383335666132316333 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit: BPF prog-id=82 op=LOAD Dec 13 02:22:44.478000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003868e8 items=0 ppid=2208 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:44.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336536343037393865313464666337383936383335666132316333 Dec 13 02:22:44.478000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:22:44.478000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:44.478000 audit: BPF prog-id=83 op=LOAD Dec 13 02:22:44.478000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000386978 items=0 ppid=2208 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:44.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336536343037393865313464666337383936383335666132316333 Dec 13 02:22:44.522733 env[1717]: time="2024-12-13T02:22:44.516363053Z" level=info msg="StartContainer for \"113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23\" returns successfully" Dec 13 02:22:44.627254 kubelet[2107]: E1213 02:22:44.626901 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:44.688482 kubelet[2107]: I1213 02:22:44.688406 2107 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-lz54k" podStartSLOduration=8.294596949 podStartE2EDuration="11.688388652s" podCreationTimestamp="2024-12-13 02:22:33 +0000 UTC" firstStartedPulling="2024-12-13 02:22:36.50314409 +0000 UTC m=+3.634599630" lastFinishedPulling="2024-12-13 02:22:39.896935787 +0000 UTC m=+7.028391333" observedRunningTime="2024-12-13 02:22:40.678424412 +0000 UTC m=+7.809879975" watchObservedRunningTime="2024-12-13 02:22:44.688388652 +0000 UTC m=+11.819844215" Dec 13 02:22:45.365231 systemd[1]: run-containerd-runc-k8s.io-113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23-runc.sQu8rj.mount: Deactivated successfully. Dec 13 02:22:45.395008 kubelet[2107]: E1213 02:22:45.394949 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:45.536156 env[1717]: time="2024-12-13T02:22:45.535656183Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:22:45.540942 systemd[1]: cri-containerd-113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23.scope: Deactivated successfully. Dec 13 02:22:45.544000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:22:45.563518 kubelet[2107]: I1213 02:22:45.563492 2107 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:22:45.571925 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23-rootfs.mount: Deactivated successfully. Dec 13 02:22:46.145401 env[1717]: time="2024-12-13T02:22:46.145346717Z" level=info msg="shim disconnected" id=113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23 Dec 13 02:22:46.145401 env[1717]: time="2024-12-13T02:22:46.145399050Z" level=warning msg="cleaning up after shim disconnected" id=113e640798e14dfc7896835fa21c3a5a8e2f414bc6305ab7df3c3d78998cfb23 namespace=k8s.io Dec 13 02:22:46.145871 env[1717]: time="2024-12-13T02:22:46.145411564Z" level=info msg="cleaning up dead shim" Dec 13 02:22:46.155656 env[1717]: time="2024-12-13T02:22:46.155611162Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:22:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2555 runtime=io.containerd.runc.v2\n" Dec 13 02:22:46.396263 kubelet[2107]: E1213 02:22:46.396137 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:46.636212 systemd[1]: Created slice kubepods-besteffort-pod6f699b5e_b2f5_4f21_9ab6_c6f4139ec319.slice. Dec 13 02:22:46.650328 env[1717]: time="2024-12-13T02:22:46.649660654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2pph,Uid:6f699b5e-b2f5-4f21-9ab6-c6f4139ec319,Namespace:calico-system,Attempt:0,}" Dec 13 02:22:46.668000 audit[2568]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:46.671910 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 02:22:46.672063 kernel: audit: type=1325 audit(1734056566.668:565): table=filter:67 family=2 entries=10 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:46.668000 audit[2568]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffceabd3970 a2=0 a3=7ffceabd395c items=0 ppid=2364 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:46.681897 kernel: audit: type=1300 audit(1734056566.668:565): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffceabd3970 a2=0 a3=7ffceabd395c items=0 ppid=2364 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:46.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:46.690290 kernel: audit: type=1327 audit(1734056566.668:565): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:46.689000 audit[2568]: NETFILTER_CFG table=nat:68 family=2 entries=20 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:46.696919 kernel: audit: type=1325 audit(1734056566.689:566): table=nat:68 family=2 entries=20 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:46.710184 kernel: audit: type=1300 audit(1734056566.689:566): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffceabd3970 a2=0 a3=7ffceabd395c items=0 ppid=2364 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:46.689000 audit[2568]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffceabd3970 a2=0 a3=7ffceabd395c items=0 ppid=2364 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:46.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:46.719467 env[1717]: time="2024-12-13T02:22:46.717733420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:22:46.720112 kernel: audit: type=1327 audit(1734056566.689:566): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:46.810251 env[1717]: time="2024-12-13T02:22:46.810181793Z" level=error msg="Failed to destroy network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:46.813720 env[1717]: time="2024-12-13T02:22:46.813658026Z" level=error msg="encountered an error cleaning up failed sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:46.814122 env[1717]: time="2024-12-13T02:22:46.814045097Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2pph,Uid:6f699b5e-b2f5-4f21-9ab6-c6f4139ec319,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:46.815683 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf-shm.mount: Deactivated successfully. Dec 13 02:22:46.817220 kubelet[2107]: E1213 02:22:46.816880 2107 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:46.817220 kubelet[2107]: E1213 02:22:46.817069 2107 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:46.817220 kubelet[2107]: E1213 02:22:46.817138 2107 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m2pph" Dec 13 02:22:46.817576 kubelet[2107]: E1213 02:22:46.817194 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m2pph_calico-system(6f699b5e-b2f5-4f21-9ab6-c6f4139ec319)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m2pph_calico-system(6f699b5e-b2f5-4f21-9ab6-c6f4139ec319)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:47.070000 audit[2601]: NETFILTER_CFG table=filter:69 family=2 entries=9 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:47.070000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff8e643150 a2=0 a3=7fff8e64313c items=0 ppid=2364 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:47.081179 kernel: audit: type=1325 audit(1734056567.070:567): table=filter:69 family=2 entries=9 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:47.081343 kernel: audit: type=1300 audit(1734056567.070:567): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff8e643150 a2=0 a3=7fff8e64313c items=0 ppid=2364 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:47.081390 kernel: audit: type=1327 audit(1734056567.070:567): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:47.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:47.085000 audit[2601]: NETFILTER_CFG table=nat:70 family=2 entries=27 op=nft_register_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:47.090094 kernel: audit: type=1325 audit(1734056567.085:568): table=nat:70 family=2 entries=27 op=nft_register_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:47.085000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff8e643150 a2=0 a3=7fff8e64313c items=0 ppid=2364 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:47.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:47.397409 kubelet[2107]: E1213 02:22:47.397245 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:47.703873 kubelet[2107]: I1213 02:22:47.703599 2107 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:22:47.705212 env[1717]: time="2024-12-13T02:22:47.705177883Z" level=info msg="StopPodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\"" Dec 13 02:22:47.750353 env[1717]: time="2024-12-13T02:22:47.750291963Z" level=error msg="StopPodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" failed" error="failed to destroy network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:47.750698 kubelet[2107]: E1213 02:22:47.750658 2107 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:22:47.750848 kubelet[2107]: E1213 02:22:47.750722 2107 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf"} Dec 13 02:22:47.750907 kubelet[2107]: E1213 02:22:47.750850 2107 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:47.750907 kubelet[2107]: E1213 02:22:47.750885 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m2pph" podUID="6f699b5e-b2f5-4f21-9ab6-c6f4139ec319" Dec 13 02:22:48.398412 kubelet[2107]: E1213 02:22:48.398274 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:48.629924 kubelet[2107]: I1213 02:22:48.629062 2107 topology_manager.go:215] "Topology Admit Handler" podUID="e807f94b-8319-495f-9c57-f3b2422ad643" podNamespace="default" podName="nginx-deployment-85f456d6dd-nbg7l" Dec 13 02:22:48.644779 systemd[1]: Created slice kubepods-besteffort-pode807f94b_8319_495f_9c57_f3b2422ad643.slice. Dec 13 02:22:48.669786 kubelet[2107]: I1213 02:22:48.669663 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nd8hn\" (UniqueName: \"kubernetes.io/projected/e807f94b-8319-495f-9c57-f3b2422ad643-kube-api-access-nd8hn\") pod \"nginx-deployment-85f456d6dd-nbg7l\" (UID: \"e807f94b-8319-495f-9c57-f3b2422ad643\") " pod="default/nginx-deployment-85f456d6dd-nbg7l" Dec 13 02:22:48.949349 env[1717]: time="2024-12-13T02:22:48.949237993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-nbg7l,Uid:e807f94b-8319-495f-9c57-f3b2422ad643,Namespace:default,Attempt:0,}" Dec 13 02:22:49.125634 env[1717]: time="2024-12-13T02:22:49.125551779Z" level=error msg="Failed to destroy network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:49.128825 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f-shm.mount: Deactivated successfully. Dec 13 02:22:49.130844 env[1717]: time="2024-12-13T02:22:49.130768367Z" level=error msg="encountered an error cleaning up failed sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:49.130956 env[1717]: time="2024-12-13T02:22:49.130869220Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-nbg7l,Uid:e807f94b-8319-495f-9c57-f3b2422ad643,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:49.131213 kubelet[2107]: E1213 02:22:49.131159 2107 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:49.131304 kubelet[2107]: E1213 02:22:49.131246 2107 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-nbg7l" Dec 13 02:22:49.131304 kubelet[2107]: E1213 02:22:49.131272 2107 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-nbg7l" Dec 13 02:22:49.131395 kubelet[2107]: E1213 02:22:49.131324 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-nbg7l_default(e807f94b-8319-495f-9c57-f3b2422ad643)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-nbg7l_default(e807f94b-8319-495f-9c57-f3b2422ad643)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-nbg7l" podUID="e807f94b-8319-495f-9c57-f3b2422ad643" Dec 13 02:22:49.399442 kubelet[2107]: E1213 02:22:49.399400 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:49.709058 kubelet[2107]: I1213 02:22:49.708120 2107 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:22:49.709392 env[1717]: time="2024-12-13T02:22:49.709356507Z" level=info msg="StopPodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\"" Dec 13 02:22:49.729180 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:22:49.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:49.745000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:22:49.745000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:22:49.745000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:22:49.791365 env[1717]: time="2024-12-13T02:22:49.791300995Z" level=error msg="StopPodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" failed" error="failed to destroy network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:49.792272 kubelet[2107]: E1213 02:22:49.791835 2107 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:22:49.792272 kubelet[2107]: E1213 02:22:49.791956 2107 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f"} Dec 13 02:22:49.792272 kubelet[2107]: E1213 02:22:49.792002 2107 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e807f94b-8319-495f-9c57-f3b2422ad643\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:49.792272 kubelet[2107]: E1213 02:22:49.792035 2107 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e807f94b-8319-495f-9c57-f3b2422ad643\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-nbg7l" podUID="e807f94b-8319-495f-9c57-f3b2422ad643" Dec 13 02:22:50.406610 kubelet[2107]: E1213 02:22:50.406568 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:51.406951 kubelet[2107]: E1213 02:22:51.406891 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:52.407217 kubelet[2107]: E1213 02:22:52.407148 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:53.383896 kubelet[2107]: E1213 02:22:53.383735 2107 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:53.407392 kubelet[2107]: E1213 02:22:53.407350 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:54.408984 kubelet[2107]: E1213 02:22:54.408936 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:54.621537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3324652139.mount: Deactivated successfully. Dec 13 02:22:54.689636 env[1717]: time="2024-12-13T02:22:54.689417146Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:54.692672 env[1717]: time="2024-12-13T02:22:54.692613103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:54.695570 env[1717]: time="2024-12-13T02:22:54.695528046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:54.698294 env[1717]: time="2024-12-13T02:22:54.698236426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:54.699195 env[1717]: time="2024-12-13T02:22:54.699158937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:22:54.723791 env[1717]: time="2024-12-13T02:22:54.723732072Z" level=info msg="CreateContainer within sandbox \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:22:54.748808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3290327998.mount: Deactivated successfully. Dec 13 02:22:54.762666 env[1717]: time="2024-12-13T02:22:54.762586117Z" level=info msg="CreateContainer within sandbox \"9929183e471fa338677d68f73216b23dc21dc33dec97da3ddf32dd5013e7b0be\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910\"" Dec 13 02:22:54.763944 env[1717]: time="2024-12-13T02:22:54.763871197Z" level=info msg="StartContainer for \"b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910\"" Dec 13 02:22:54.787550 systemd[1]: Started cri-containerd-b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910.scope. Dec 13 02:22:54.814000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.816912 kernel: kauditd_printk_skb: 6 callbacks suppressed Dec 13 02:22:54.816997 kernel: audit: type=1400 audit(1734056574.814:573): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.814000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe4a4bff228 items=0 ppid=2208 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.833207 kernel: audit: type=1300 audit(1734056574.814:573): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe4a4bff228 items=0 ppid=2208 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.833346 kernel: audit: type=1327 audit(1734056574.814:573): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333461633165346465306337643832333737653635383466323863 Dec 13 02:22:54.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333461633165346465306337643832333737653635383466323863 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.841652 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.841856 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.848927 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.849215 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.856518 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.856567 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.866054 kernel: audit: type=1400 audit(1734056574.822:574): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.822000 audit: BPF prog-id=84 op=LOAD Dec 13 02:22:54.822000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5c88 items=0 ppid=2208 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333461633165346465306337643832333737653635383466323863 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.837000 audit: BPF prog-id=85 op=LOAD Dec 13 02:22:54.837000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002c5cd8 items=0 ppid=2208 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333461633165346465306337643832333737653635383466323863 Dec 13 02:22:54.844000 audit: BPF prog-id=85 op=UNLOAD Dec 13 02:22:54.844000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:54.844000 audit: BPF prog-id=86 op=LOAD Dec 13 02:22:54.844000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002c5d68 items=0 ppid=2208 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333461633165346465306337643832333737653635383466323863 Dec 13 02:22:54.883570 env[1717]: time="2024-12-13T02:22:54.883517486Z" level=info msg="StartContainer for \"b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910\" returns successfully" Dec 13 02:22:55.001918 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:22:55.002110 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:22:55.409779 kubelet[2107]: E1213 02:22:55.409742 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:55.755287 systemd[1]: run-containerd-runc-k8s.io-b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910-runc.PDj8JB.mount: Deactivated successfully. Dec 13 02:22:55.781945 kubelet[2107]: I1213 02:22:55.781850 2107 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-lpzfj" podStartSLOduration=4.552294982 podStartE2EDuration="22.781829104s" podCreationTimestamp="2024-12-13 02:22:33 +0000 UTC" firstStartedPulling="2024-12-13 02:22:36.470895399 +0000 UTC m=+3.602350945" lastFinishedPulling="2024-12-13 02:22:54.700429523 +0000 UTC m=+21.831885067" observedRunningTime="2024-12-13 02:22:55.781167515 +0000 UTC m=+22.912623077" watchObservedRunningTime="2024-12-13 02:22:55.781829104 +0000 UTC m=+22.913284668" Dec 13 02:22:56.410305 kubelet[2107]: E1213 02:22:56.410257 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:56.598000 audit[2815]: AVC avc: denied { write } for pid=2815 comm="tee" name="fd" dev="proc" ino=19848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.598000 audit[2815]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4689ba25 a2=241 a3=1b6 items=1 ppid=2779 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.598000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:22:56.598000 audit: PATH item=0 name="/dev/fd/63" inode=19837 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.598000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.601000 audit[2817]: AVC avc: denied { write } for pid=2817 comm="tee" name="fd" dev="proc" ino=20564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.608000 audit[2820]: AVC avc: denied { write } for pid=2820 comm="tee" name="fd" dev="proc" ino=20567 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.610000 audit[2822]: AVC avc: denied { write } for pid=2822 comm="tee" name="fd" dev="proc" ino=20570 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.601000 audit[2817]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc01a86a23 a2=241 a3=1b6 items=1 ppid=2784 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.601000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:22:56.601000 audit: PATH item=0 name="/dev/fd/63" inode=19840 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.601000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.608000 audit[2820]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff820f2a14 a2=241 a3=1b6 items=1 ppid=2780 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.608000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:22:56.608000 audit: PATH item=0 name="/dev/fd/63" inode=20556 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.610000 audit[2822]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecc2e7a23 a2=241 a3=1b6 items=1 ppid=2783 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.608000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.610000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:22:56.610000 audit: PATH item=0 name="/dev/fd/63" inode=20557 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.610000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.629000 audit[2841]: AVC avc: denied { write } for pid=2841 comm="tee" name="fd" dev="proc" ino=20583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.629000 audit[2841]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec8df6a13 a2=241 a3=1b6 items=1 ppid=2787 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.636000 audit[2845]: AVC avc: denied { write } for pid=2845 comm="tee" name="fd" dev="proc" ino=19857 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.636000 audit[2845]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5af7ba23 a2=241 a3=1b6 items=1 ppid=2798 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.636000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:22:56.636000 audit: PATH item=0 name="/dev/fd/63" inode=19854 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.636000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.629000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:22:56.629000 audit: PATH item=0 name="/dev/fd/63" inode=20576 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.647000 audit[2847]: AVC avc: denied { write } for pid=2847 comm="tee" name="fd" dev="proc" ino=20587 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:56.647000 audit[2847]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5c856a24 a2=241 a3=1b6 items=1 ppid=2789 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.647000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:22:56.647000 audit: PATH item=0 name="/dev/fd/63" inode=20580 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:56.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:56.771907 systemd[1]: run-containerd-runc-k8s.io-b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910-runc.hsVIlL.mount: Deactivated successfully. Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit: BPF prog-id=87 op=LOAD Dec 13 02:22:57.023000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd93abeda0 a2=98 a3=3 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.023000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.023000 audit: BPF prog-id=87 op=UNLOAD Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.023000 audit: BPF prog-id=88 op=LOAD Dec 13 02:22:57.023000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd93abeb80 a2=74 a3=540051 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.023000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.024000 audit: BPF prog-id=88 op=UNLOAD Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.024000 audit: BPF prog-id=89 op=LOAD Dec 13 02:22:57.024000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd93abebb0 a2=94 a3=2 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.024000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.024000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit: BPF prog-id=90 op=LOAD Dec 13 02:22:57.175000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd93abea70 a2=40 a3=1 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.175000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.175000 audit: BPF prog-id=90 op=UNLOAD Dec 13 02:22:57.175000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.175000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd93abeb40 a2=50 a3=7ffd93abec20 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.175000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93abea80 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93abeab0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93abe9c0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93abead0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93abeab0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93abeaa0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93abead0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93abeab0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93abead0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93abeaa0 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.190000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.190000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93abeb10 a2=28 a3=0 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd93abe8c0 a2=50 a3=1 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit: BPF prog-id=91 op=LOAD Dec 13 02:22:57.191000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd93abe8c0 a2=94 a3=5 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.191000 audit: BPF prog-id=91 op=UNLOAD Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd93abe970 a2=50 a3=1 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd93abea90 a2=4 a3=38 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.191000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:57.191000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd93abeae0 a2=94 a3=6 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:57.192000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd93abe290 a2=94 a3=83 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { perfmon } for pid=2908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { bpf } for pid=2908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.192000 audit[2908]: AVC avc: denied { confidentiality } for pid=2908 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:57.192000 audit[2908]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd93abe290 a2=94 a3=83 items=0 ppid=2786 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit: BPF prog-id=92 op=LOAD Dec 13 02:22:57.209000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe99709d0 a2=98 a3=1999999999999999 items=0 ppid=2786 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.209000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:22:57.209000 audit: BPF prog-id=92 op=UNLOAD Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit: BPF prog-id=93 op=LOAD Dec 13 02:22:57.209000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe99708b0 a2=74 a3=ffff items=0 ppid=2786 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.209000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:22:57.209000 audit: BPF prog-id=93 op=UNLOAD Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.209000 audit: BPF prog-id=94 op=LOAD Dec 13 02:22:57.209000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe99708f0 a2=40 a3=7fffe9970ad0 items=0 ppid=2786 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.209000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:22:57.209000 audit: BPF prog-id=94 op=UNLOAD Dec 13 02:22:57.328359 (udev-worker)[2722]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:22:57.331843 systemd-networkd[1457]: vxlan.calico: Link UP Dec 13 02:22:57.331851 systemd-networkd[1457]: vxlan.calico: Gained carrier Dec 13 02:22:57.411454 kubelet[2107]: E1213 02:22:57.411398 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.441000 audit: BPF prog-id=95 op=LOAD Dec 13 02:22:57.441000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaab02ec0 a2=98 a3=ffffffff items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.441000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.441000 audit: BPF prog-id=95 op=UNLOAD Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit: BPF prog-id=96 op=LOAD Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaab02cd0 a2=74 a3=540051 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit: BPF prog-id=96 op=UNLOAD Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit: BPF prog-id=97 op=LOAD Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaab02d00 a2=94 a3=2 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit: BPF prog-id=97 op=UNLOAD Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaab02bd0 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaab02c00 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaab02b10 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaab02c20 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaab02c00 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaab02bf0 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaab02c20 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaab02c00 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaab02c20 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaab02bf0 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaab02c60 a2=28 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.442000 audit: BPF prog-id=98 op=LOAD Dec 13 02:22:57.442000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaab02ad0 a2=40 a3=0 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.442000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.442000 audit: BPF prog-id=98 op=UNLOAD Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdaab02ac0 a2=50 a3=2800 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdaab02ac0 a2=50 a3=2800 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit: BPF prog-id=99 op=LOAD Dec 13 02:22:57.443000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaab022e0 a2=94 a3=2 items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.443000 audit: BPF prog-id=99 op=UNLOAD Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.443000 audit: BPF prog-id=100 op=LOAD Dec 13 02:22:57.443000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaab023e0 a2=94 a3=2d items=0 ppid=2786 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.452000 audit: BPF prog-id=101 op=LOAD Dec 13 02:22:57.452000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7914a400 a2=98 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.452000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.452000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit: BPF prog-id=102 op=LOAD Dec 13 02:22:57.453000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7914a1e0 a2=74 a3=540051 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.453000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.453000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.453000 audit: BPF prog-id=103 op=LOAD Dec 13 02:22:57.453000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7914a210 a2=94 a3=2 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.453000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.453000 audit: BPF prog-id=103 op=UNLOAD Dec 13 02:22:57.449728 (udev-worker)[2723]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit: BPF prog-id=104 op=LOAD Dec 13 02:22:57.628000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7914a0d0 a2=40 a3=1 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.628000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:22:57.628000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.628000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe7914a1a0 a2=50 a3=7ffe7914a280 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.645000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.645000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7914a0e0 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.645000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.645000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7914a110 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.645000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.645000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7914a020 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.645000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.645000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7914a130 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.645000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7914a110 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7914a100 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7914a130 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7914a110 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7914a130 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7914a100 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7914a170 a2=28 a3=0 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe79149f20 a2=50 a3=1 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit: BPF prog-id=105 op=LOAD Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe79149f20 a2=94 a3=5 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe79149fd0 a2=50 a3=1 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe7914a0f0 a2=4 a3=38 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.646000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:57.646000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7914a140 a2=94 a3=6 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.646000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:57.647000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe791498f0 a2=94 a3=83 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.647000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.647000 audit[2940]: AVC avc: denied { confidentiality } for pid=2940 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:57.647000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe791498f0 a2=94 a3=83 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.647000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.648000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.648000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7914b330 a2=10 a3=f1f00800 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.648000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.648000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.648000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7914b1d0 a2=10 a3=3 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.648000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.648000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.648000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7914b170 a2=10 a3=3 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.648000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:57.648000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:57.648000 audit[2940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7914b170 a2=10 a3=7 items=0 ppid=2786 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.648000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:56.786000 audit: BPF prog-id=100 op=UNLOAD Dec 13 02:22:56.786000 audit[1712]: SYSCALL arch=c000003e syscall=232 success=yes exit=1 a0=5 a1=561fa41132d0 a2=22 a3=ffffffff items=0 ppid=1 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:56.786000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-logind" Dec 13 02:22:57.738000 audit[2967]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:57.738000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffa7664960 a2=0 a3=7fffa766494c items=0 ppid=2786 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.738000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:57.743000 audit[2966]: NETFILTER_CFG table=nat:72 family=2 entries=15 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:57.743000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffef9d69f50 a2=0 a3=7ffef9d69f3c items=0 ppid=2786 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.743000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:57.751000 audit[2969]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:57.751000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc4ecfa8e0 a2=0 a3=7ffc4ecfa8cc items=0 ppid=2786 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.751000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:57.755000 audit[2965]: NETFILTER_CFG table=raw:74 family=2 entries=21 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:57.755000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffec85a450 a2=0 a3=7fffec85a43c items=0 ppid=2786 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:57.755000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:58.411815 kubelet[2107]: E1213 02:22:58.411771 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:58.861374 systemd-networkd[1457]: vxlan.calico: Gained IPv6LL Dec 13 02:22:59.412492 kubelet[2107]: E1213 02:22:59.412433 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:22:59.628659 env[1717]: time="2024-12-13T02:22:59.627941819Z" level=info msg="StopPodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\"" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.707 [INFO][2992] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.709 [INFO][2992] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" iface="eth0" netns="/var/run/netns/cni-68448d6f-2774-092a-290c-3b922875a342" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.709 [INFO][2992] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" iface="eth0" netns="/var/run/netns/cni-68448d6f-2774-092a-290c-3b922875a342" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.711 [INFO][2992] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" iface="eth0" netns="/var/run/netns/cni-68448d6f-2774-092a-290c-3b922875a342" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.711 [INFO][2992] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.711 [INFO][2992] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.818 [INFO][2999] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.818 [INFO][2999] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.818 [INFO][2999] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.837 [WARNING][2999] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.837 [INFO][2999] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.840 [INFO][2999] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:59.844504 env[1717]: 2024-12-13 02:22:59.842 [INFO][2992] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:22:59.848028 env[1717]: time="2024-12-13T02:22:59.845471113Z" level=info msg="TearDown network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" successfully" Dec 13 02:22:59.848028 env[1717]: time="2024-12-13T02:22:59.845514407Z" level=info msg="StopPodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" returns successfully" Dec 13 02:22:59.847828 systemd[1]: run-netns-cni\x2d68448d6f\x2d2774\x2d092a\x2d290c\x2d3b922875a342.mount: Deactivated successfully. Dec 13 02:22:59.850073 env[1717]: time="2024-12-13T02:22:59.850013436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2pph,Uid:6f699b5e-b2f5-4f21-9ab6-c6f4139ec319,Namespace:calico-system,Attempt:1,}" Dec 13 02:23:00.210939 systemd-networkd[1457]: calid31898013bf: Link UP Dec 13 02:23:00.212343 (udev-worker)[2942]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:23:00.219328 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:23:00.219565 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid31898013bf: link becomes ready Dec 13 02:23:00.217168 systemd-networkd[1457]: calid31898013bf: Gained carrier Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:22:59.991 [INFO][3005] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.209-k8s-csi--node--driver--m2pph-eth0 csi-node-driver- calico-system 6f699b5e-b2f5-4f21-9ab6-c6f4139ec319 1018 0 2024-12-13 02:22:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.21.209 csi-node-driver-m2pph eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid31898013bf [] []}} ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:22:59.992 [INFO][3005] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.033 [INFO][3017] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" HandleID="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.102 [INFO][3017] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" HandleID="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003198f0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.21.209", "pod":"csi-node-driver-m2pph", "timestamp":"2024-12-13 02:23:00.033746866 +0000 UTC"}, Hostname:"172.31.21.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.102 [INFO][3017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.102 [INFO][3017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.102 [INFO][3017] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.209' Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.106 [INFO][3017] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.129 [INFO][3017] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.141 [INFO][3017] ipam/ipam.go 489: Trying affinity for 192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.145 [INFO][3017] ipam/ipam.go 155: Attempting to load block cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.149 [INFO][3017] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.149 [INFO][3017] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.114.0/26 handle="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.154 [INFO][3017] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85 Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.176 [INFO][3017] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.114.0/26 handle="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.199 [INFO][3017] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.114.1/26] block=192.168.114.0/26 handle="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.199 [INFO][3017] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.114.1/26] handle="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" host="172.31.21.209" Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.199 [INFO][3017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:00.236834 env[1717]: 2024-12-13 02:23:00.199 [INFO][3017] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.114.1/26] IPv6=[] ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" HandleID="k8s-pod-network.a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.238049 env[1717]: 2024-12-13 02:23:00.200 [INFO][3005] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-csi--node--driver--m2pph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"", Pod:"csi-node-driver-m2pph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.114.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid31898013bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:00.238049 env[1717]: 2024-12-13 02:23:00.201 [INFO][3005] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.114.1/32] ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.238049 env[1717]: 2024-12-13 02:23:00.201 [INFO][3005] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid31898013bf ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.238049 env[1717]: 2024-12-13 02:23:00.217 [INFO][3005] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.238049 env[1717]: 2024-12-13 02:23:00.217 [INFO][3005] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-csi--node--driver--m2pph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85", Pod:"csi-node-driver-m2pph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.114.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid31898013bf", MAC:"2e:d0:3b:51:86:d5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:00.238049 env[1717]: 2024-12-13 02:23:00.235 [INFO][3005] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85" Namespace="calico-system" Pod="csi-node-driver-m2pph" WorkloadEndpoint="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:00.260263 env[1717]: time="2024-12-13T02:23:00.259100184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:23:00.260263 env[1717]: time="2024-12-13T02:23:00.259145261Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:23:00.260263 env[1717]: time="2024-12-13T02:23:00.259162536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:23:00.260263 env[1717]: time="2024-12-13T02:23:00.259312371Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85 pid=3042 runtime=io.containerd.runc.v2 Dec 13 02:23:00.269224 kernel: kauditd_printk_skb: 550 callbacks suppressed Dec 13 02:23:00.269349 kernel: audit: type=1325 audit(1734056580.259:681): table=filter:75 family=2 entries=34 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:23:00.259000 audit[3044]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:23:00.259000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff0f861de0 a2=0 a3=7fff0f861dcc items=0 ppid=2786 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.278297 kernel: audit: type=1300 audit(1734056580.259:681): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff0f861de0 a2=0 a3=7fff0f861dcc items=0 ppid=2786 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.259000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:23:00.283234 kernel: audit: type=1327 audit(1734056580.259:681): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:23:00.295447 systemd[1]: run-containerd-runc-k8s.io-a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85-runc.tiEfUH.mount: Deactivated successfully. Dec 13 02:23:00.300865 systemd[1]: Started cri-containerd-a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85.scope. Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.324340 kernel: audit: type=1400 audit(1734056580.318:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.329994 kernel: audit: type=1400 audit(1734056580.318:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.336174 kernel: audit: type=1400 audit(1734056580.318:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.341167 kernel: audit: type=1400 audit(1734056580.318:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.348100 kernel: audit: type=1400 audit(1734056580.318:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.355121 kernel: audit: type=1400 audit(1734056580.318:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.361307 kernel: audit: type=1400 audit(1734056580.318:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.322000 audit: BPF prog-id=106 op=LOAD Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3042 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133326139393734663365663964313839386564323438363039376663 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3042 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133326139393734663365663964313839386564323438363039376663 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.323000 audit: BPF prog-id=107 op=LOAD Dec 13 02:23:00.323000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000325070 items=0 ppid=3042 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133326139393734663365663964313839386564323438363039376663 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit: BPF prog-id=108 op=LOAD Dec 13 02:23:00.327000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003250b8 items=0 ppid=3042 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133326139393734663365663964313839386564323438363039376663 Dec 13 02:23:00.327000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:23:00.327000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:00.327000 audit: BPF prog-id=109 op=LOAD Dec 13 02:23:00.327000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003254c8 items=0 ppid=3042 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133326139393734663365663964313839386564323438363039376663 Dec 13 02:23:00.370425 env[1717]: time="2024-12-13T02:23:00.365729332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m2pph,Uid:6f699b5e-b2f5-4f21-9ab6-c6f4139ec319,Namespace:calico-system,Attempt:1,} returns sandbox id \"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85\"" Dec 13 02:23:00.370425 env[1717]: time="2024-12-13T02:23:00.367402624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:23:00.412600 kubelet[2107]: E1213 02:23:00.412564 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:01.413386 kubelet[2107]: E1213 02:23:01.413275 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:01.614141 systemd-networkd[1457]: calid31898013bf: Gained IPv6LL Dec 13 02:23:01.701486 env[1717]: time="2024-12-13T02:23:01.701436731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:01.708380 env[1717]: time="2024-12-13T02:23:01.708324183Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:01.715375 env[1717]: time="2024-12-13T02:23:01.715332300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:01.718556 env[1717]: time="2024-12-13T02:23:01.718513349Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:01.719525 env[1717]: time="2024-12-13T02:23:01.719492771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:23:01.725097 env[1717]: time="2024-12-13T02:23:01.725047730Z" level=info msg="CreateContainer within sandbox \"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:23:01.769243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2070196206.mount: Deactivated successfully. Dec 13 02:23:01.780269 env[1717]: time="2024-12-13T02:23:01.780207532Z" level=info msg="CreateContainer within sandbox \"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b04c9562ea9ba060e3325dda87b16bfd873151ce394e875b81b7f98a032512de\"" Dec 13 02:23:01.781606 env[1717]: time="2024-12-13T02:23:01.781480693Z" level=info msg="StartContainer for \"b04c9562ea9ba060e3325dda87b16bfd873151ce394e875b81b7f98a032512de\"" Dec 13 02:23:01.850556 systemd[1]: Started cri-containerd-b04c9562ea9ba060e3325dda87b16bfd873151ce394e875b81b7f98a032512de.scope. Dec 13 02:23:01.862681 systemd[1]: run-containerd-runc-k8s.io-b04c9562ea9ba060e3325dda87b16bfd873151ce394e875b81b7f98a032512de-runc.NJfHGH.mount: Deactivated successfully. Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f54004ad7f8 items=0 ppid=3042 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:01.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346339353632656139626130363065333332356464613837623136 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit: BPF prog-id=110 op=LOAD Dec 13 02:23:01.911000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003de478 items=0 ppid=3042 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:01.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346339353632656139626130363065333332356464613837623136 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit: BPF prog-id=111 op=LOAD Dec 13 02:23:01.911000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003de4c8 items=0 ppid=3042 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:01.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346339353632656139626130363065333332356464613837623136 Dec 13 02:23:01.911000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:23:01.911000 audit: BPF prog-id=110 op=UNLOAD Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:01.911000 audit: BPF prog-id=112 op=LOAD Dec 13 02:23:01.911000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003de558 items=0 ppid=3042 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:01.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346339353632656139626130363065333332356464613837623136 Dec 13 02:23:01.970608 env[1717]: time="2024-12-13T02:23:01.970311689Z" level=info msg="StartContainer for \"b04c9562ea9ba060e3325dda87b16bfd873151ce394e875b81b7f98a032512de\" returns successfully" Dec 13 02:23:01.976672 env[1717]: time="2024-12-13T02:23:01.976610571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:23:02.414538 kubelet[2107]: E1213 02:23:02.414442 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:02.627710 env[1717]: time="2024-12-13T02:23:02.627600507Z" level=info msg="StopPodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\"" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.687 [INFO][3128] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.688 [INFO][3128] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" iface="eth0" netns="/var/run/netns/cni-2a07f15f-3f35-9632-4b97-20a4690aa3e2" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.688 [INFO][3128] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" iface="eth0" netns="/var/run/netns/cni-2a07f15f-3f35-9632-4b97-20a4690aa3e2" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.688 [INFO][3128] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" iface="eth0" netns="/var/run/netns/cni-2a07f15f-3f35-9632-4b97-20a4690aa3e2" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.689 [INFO][3128] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.689 [INFO][3128] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.721 [INFO][3134] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.721 [INFO][3134] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.721 [INFO][3134] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.730 [WARNING][3134] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.730 [INFO][3134] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.735 [INFO][3134] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:02.737939 env[1717]: 2024-12-13 02:23:02.736 [INFO][3128] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:02.739242 env[1717]: time="2024-12-13T02:23:02.739192012Z" level=info msg="TearDown network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" successfully" Dec 13 02:23:02.739362 env[1717]: time="2024-12-13T02:23:02.739341771Z" level=info msg="StopPodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" returns successfully" Dec 13 02:23:02.743024 env[1717]: time="2024-12-13T02:23:02.742983570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-nbg7l,Uid:e807f94b-8319-495f-9c57-f3b2422ad643,Namespace:default,Attempt:1,}" Dec 13 02:23:02.750149 systemd[1]: run-netns-cni\x2d2a07f15f\x2d3f35\x2d9632\x2d4b97\x2d20a4690aa3e2.mount: Deactivated successfully. Dec 13 02:23:03.058692 systemd-networkd[1457]: calie2989de7a29: Link UP Dec 13 02:23:03.066413 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:23:03.066537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie2989de7a29: link becomes ready Dec 13 02:23:03.066966 systemd-networkd[1457]: calie2989de7a29: Gained carrier Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.864 [INFO][3147] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0 nginx-deployment-85f456d6dd- default e807f94b-8319-495f-9c57-f3b2422ad643 1032 0 2024-12-13 02:22:48 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.21.209 nginx-deployment-85f456d6dd-nbg7l eth0 default [] [] [kns.default ksa.default.default] calie2989de7a29 [] []}} ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.864 [INFO][3147] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.927 [INFO][3158] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" HandleID="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.959 [INFO][3158] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" HandleID="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310cb0), Attrs:map[string]string{"namespace":"default", "node":"172.31.21.209", "pod":"nginx-deployment-85f456d6dd-nbg7l", "timestamp":"2024-12-13 02:23:02.927341586 +0000 UTC"}, Hostname:"172.31.21.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.960 [INFO][3158] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.960 [INFO][3158] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.960 [INFO][3158] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.209' Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.964 [INFO][3158] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.984 [INFO][3158] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:02.998 [INFO][3158] ipam/ipam.go 489: Trying affinity for 192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.006 [INFO][3158] ipam/ipam.go 155: Attempting to load block cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.015 [INFO][3158] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.016 [INFO][3158] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.114.0/26 handle="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.022 [INFO][3158] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125 Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.033 [INFO][3158] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.114.0/26 handle="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.052 [INFO][3158] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.114.2/26] block=192.168.114.0/26 handle="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.052 [INFO][3158] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.114.2/26] handle="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" host="172.31.21.209" Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.052 [INFO][3158] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:03.097875 env[1717]: 2024-12-13 02:23:03.052 [INFO][3158] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.114.2/26] IPv6=[] ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" HandleID="k8s-pod-network.4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.101890 env[1717]: 2024-12-13 02:23:03.055 [INFO][3147] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e807f94b-8319-495f-9c57-f3b2422ad643", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-nbg7l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.114.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie2989de7a29", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:03.101890 env[1717]: 2024-12-13 02:23:03.055 [INFO][3147] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.114.2/32] ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.101890 env[1717]: 2024-12-13 02:23:03.055 [INFO][3147] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie2989de7a29 ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.101890 env[1717]: 2024-12-13 02:23:03.072 [INFO][3147] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.101890 env[1717]: 2024-12-13 02:23:03.072 [INFO][3147] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e807f94b-8319-495f-9c57-f3b2422ad643", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125", Pod:"nginx-deployment-85f456d6dd-nbg7l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.114.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie2989de7a29", MAC:"be:a6:38:04:3c:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:03.101890 env[1717]: 2024-12-13 02:23:03.096 [INFO][3147] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125" Namespace="default" Pod="nginx-deployment-85f456d6dd-nbg7l" WorkloadEndpoint="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:03.130000 audit[3178]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:23:03.130000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff911f0240 a2=0 a3=7fff911f022c items=0 ppid=2786 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.130000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:23:03.153222 env[1717]: time="2024-12-13T02:23:03.153144132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:23:03.153390 env[1717]: time="2024-12-13T02:23:03.153237127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:23:03.153390 env[1717]: time="2024-12-13T02:23:03.153267967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:23:03.153512 env[1717]: time="2024-12-13T02:23:03.153440159Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125 pid=3187 runtime=io.containerd.runc.v2 Dec 13 02:23:03.203437 systemd[1]: Started cri-containerd-4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125.scope. Dec 13 02:23:03.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.229000 audit: BPF prog-id=113 op=LOAD Dec 13 02:23:03.230000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.230000 audit[3197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373364626531616365623235663832363336623839666139396663 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373364626531616365623235663832363336623839666139396663 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.231000 audit: BPF prog-id=114 op=LOAD Dec 13 02:23:03.231000 audit[3197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a2ae0 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373364626531616365623235663832363336623839666139396663 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit: BPF prog-id=115 op=LOAD Dec 13 02:23:03.232000 audit[3197]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a2b28 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373364626531616365623235663832363336623839666139396663 Dec 13 02:23:03.232000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:23:03.232000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.232000 audit: BPF prog-id=116 op=LOAD Dec 13 02:23:03.232000 audit[3197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a2f38 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373364626531616365623235663832363336623839666139396663 Dec 13 02:23:03.295120 env[1717]: time="2024-12-13T02:23:03.295064036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-nbg7l,Uid:e807f94b-8319-495f-9c57-f3b2422ad643,Namespace:default,Attempt:1,} returns sandbox id \"4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125\"" Dec 13 02:23:03.419910 kubelet[2107]: E1213 02:23:03.415454 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:03.540246 env[1717]: time="2024-12-13T02:23:03.540185875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:03.546117 env[1717]: time="2024-12-13T02:23:03.543708633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:03.547514 env[1717]: time="2024-12-13T02:23:03.547481274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:03.549827 env[1717]: time="2024-12-13T02:23:03.549692249Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:03.550469 env[1717]: time="2024-12-13T02:23:03.550436182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:23:03.553463 env[1717]: time="2024-12-13T02:23:03.553427390Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:23:03.554747 env[1717]: time="2024-12-13T02:23:03.554714520Z" level=info msg="CreateContainer within sandbox \"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:23:03.579834 env[1717]: time="2024-12-13T02:23:03.579784188Z" level=info msg="CreateContainer within sandbox \"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"12d0e103b360aa3974bdc6c8b7ff7acb69994d0c7bb78ae4bf878d8c4d8d56d6\"" Dec 13 02:23:03.580558 env[1717]: time="2024-12-13T02:23:03.580484411Z" level=info msg="StartContainer for \"12d0e103b360aa3974bdc6c8b7ff7acb69994d0c7bb78ae4bf878d8c4d8d56d6\"" Dec 13 02:23:03.613612 systemd[1]: Started cri-containerd-12d0e103b360aa3974bdc6c8b7ff7acb69994d0c7bb78ae4bf878d8c4d8d56d6.scope. Dec 13 02:23:03.641000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.641000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7ffa1b004cb8 items=0 ppid=3042 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643065313033623336306161333937346264633663386237666637 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit: BPF prog-id=117 op=LOAD Dec 13 02:23:03.642000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001b4d38 items=0 ppid=3042 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643065313033623336306161333937346264633663386237666637 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit: BPF prog-id=118 op=LOAD Dec 13 02:23:03.642000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001b4d88 items=0 ppid=3042 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643065313033623336306161333937346264633663386237666637 Dec 13 02:23:03.642000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:23:03.642000 audit: BPF prog-id=117 op=UNLOAD Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:03.642000 audit: BPF prog-id=119 op=LOAD Dec 13 02:23:03.642000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001b4e18 items=0 ppid=3042 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:03.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643065313033623336306161333937346264633663386237666637 Dec 13 02:23:03.692037 env[1717]: time="2024-12-13T02:23:03.682862342Z" level=info msg="StartContainer for \"12d0e103b360aa3974bdc6c8b7ff7acb69994d0c7bb78ae4bf878d8c4d8d56d6\" returns successfully" Dec 13 02:23:03.751298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1046105627.mount: Deactivated successfully. Dec 13 02:23:04.416317 kubelet[2107]: E1213 02:23:04.416275 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:04.530204 kubelet[2107]: I1213 02:23:04.530171 2107 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:23:04.530204 kubelet[2107]: I1213 02:23:04.530205 2107 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:23:04.622161 systemd-networkd[1457]: calie2989de7a29: Gained IPv6LL Dec 13 02:23:04.682792 update_engine[1713]: I1213 02:23:04.681378 1713 update_attempter.cc:509] Updating boot flags... Dec 13 02:23:05.419967 kubelet[2107]: E1213 02:23:05.419891 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:06.421355 kubelet[2107]: E1213 02:23:06.421259 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:06.848400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2656063953.mount: Deactivated successfully. Dec 13 02:23:07.421936 kubelet[2107]: E1213 02:23:07.421878 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:08.422606 kubelet[2107]: E1213 02:23:08.422561 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:09.049579 env[1717]: time="2024-12-13T02:23:09.049526122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:09.053013 env[1717]: time="2024-12-13T02:23:09.052967254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:09.056250 env[1717]: time="2024-12-13T02:23:09.056157115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:09.058847 env[1717]: time="2024-12-13T02:23:09.058808053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:09.059802 env[1717]: time="2024-12-13T02:23:09.059760148Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:23:09.065506 env[1717]: time="2024-12-13T02:23:09.065460245Z" level=info msg="CreateContainer within sandbox \"4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 02:23:09.092904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1263537228.mount: Deactivated successfully. Dec 13 02:23:09.111013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount238761618.mount: Deactivated successfully. Dec 13 02:23:09.118864 env[1717]: time="2024-12-13T02:23:09.118806887Z" level=info msg="CreateContainer within sandbox \"4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"8a9d07efce08ec6cdafd13f9fe92601bbb4c186cd1d8bf37e9586d8e1b9e7b32\"" Dec 13 02:23:09.119911 env[1717]: time="2024-12-13T02:23:09.119876831Z" level=info msg="StartContainer for \"8a9d07efce08ec6cdafd13f9fe92601bbb4c186cd1d8bf37e9586d8e1b9e7b32\"" Dec 13 02:23:09.160138 systemd[1]: Started cri-containerd-8a9d07efce08ec6cdafd13f9fe92601bbb4c186cd1d8bf37e9586d8e1b9e7b32.scope. Dec 13 02:23:09.213407 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 02:23:09.213574 kernel: audit: type=1400 audit(1734056589.187:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213666 kernel: audit: type=1400 audit(1734056589.187:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.217907 kernel: audit: type=1400 audit(1734056589.187:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.226227 kernel: audit: type=1400 audit(1734056589.187:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.226495 kernel: audit: type=1400 audit(1734056589.187:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.231127 kernel: audit: type=1400 audit(1734056589.187:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.239646 kernel: audit: type=1400 audit(1734056589.187:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.239823 kernel: audit: type=1400 audit(1734056589.187:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.243509 kernel: audit: type=1400 audit(1734056589.187:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.247672 kernel: audit: type=1400 audit(1734056589.188:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.188000 audit: BPF prog-id=120 op=LOAD Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:09.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396430376566636530386563366364616664313366396665393236 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:09.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396430376566636530386563366364616664313366396665393236 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit: BPF prog-id=121 op=LOAD Dec 13 02:23:09.193000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00037e210 items=0 ppid=3187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:09.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396430376566636530386563366364616664313366396665393236 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.193000 audit: BPF prog-id=122 op=LOAD Dec 13 02:23:09.193000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00037e258 items=0 ppid=3187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:09.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396430376566636530386563366364616664313366396665393236 Dec 13 02:23:09.213000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:23:09.213000 audit: BPF prog-id=121 op=UNLOAD Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:09.213000 audit: BPF prog-id=123 op=LOAD Dec 13 02:23:09.213000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020bb68 items=0 ppid=3187 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:09.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861396430376566636530386563366364616664313366396665393236 Dec 13 02:23:09.252606 env[1717]: time="2024-12-13T02:23:09.251005872Z" level=info msg="StartContainer for \"8a9d07efce08ec6cdafd13f9fe92601bbb4c186cd1d8bf37e9586d8e1b9e7b32\" returns successfully" Dec 13 02:23:09.423805 kubelet[2107]: E1213 02:23:09.423668 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:09.847051 kubelet[2107]: I1213 02:23:09.846509 2107 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-m2pph" podStartSLOduration=32.661238423 podStartE2EDuration="35.84646452s" podCreationTimestamp="2024-12-13 02:22:34 +0000 UTC" firstStartedPulling="2024-12-13 02:23:00.367003484 +0000 UTC m=+27.498459026" lastFinishedPulling="2024-12-13 02:23:03.552229567 +0000 UTC m=+30.683685123" observedRunningTime="2024-12-13 02:23:03.832617557 +0000 UTC m=+30.964073121" watchObservedRunningTime="2024-12-13 02:23:09.84646452 +0000 UTC m=+36.977920084" Dec 13 02:23:09.847051 kubelet[2107]: I1213 02:23:09.846838 2107 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-nbg7l" podStartSLOduration=16.081470302 podStartE2EDuration="21.846827739s" podCreationTimestamp="2024-12-13 02:22:48 +0000 UTC" firstStartedPulling="2024-12-13 02:23:03.29674049 +0000 UTC m=+30.428196046" lastFinishedPulling="2024-12-13 02:23:09.062097922 +0000 UTC m=+36.193553483" observedRunningTime="2024-12-13 02:23:09.846714641 +0000 UTC m=+36.978170204" watchObservedRunningTime="2024-12-13 02:23:09.846827739 +0000 UTC m=+36.978283285" Dec 13 02:23:10.424193 kubelet[2107]: E1213 02:23:10.424140 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:11.424692 kubelet[2107]: E1213 02:23:11.424639 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:12.425214 kubelet[2107]: E1213 02:23:12.425156 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:13.383844 kubelet[2107]: E1213 02:23:13.383795 2107 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:13.426189 kubelet[2107]: E1213 02:23:13.426152 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:13.827517 amazon-ssm-agent[1780]: 2024-12-13 02:23:13 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 02:23:14.426876 kubelet[2107]: E1213 02:23:14.426824 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:15.427929 kubelet[2107]: E1213 02:23:15.427878 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:16.429001 kubelet[2107]: E1213 02:23:16.428945 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:16.798112 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 02:23:16.798263 kernel: audit: type=1325 audit(1734056596.795:749): table=filter:77 family=2 entries=20 op=nft_register_rule pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.795000 audit[3446]: NETFILTER_CFG table=filter:77 family=2 entries=20 op=nft_register_rule pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.795000 audit[3446]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcdb6beb20 a2=0 a3=7ffcdb6beb0c items=0 ppid=2364 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.805149 kernel: audit: type=1300 audit(1734056596.795:749): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcdb6beb20 a2=0 a3=7ffcdb6beb0c items=0 ppid=2364 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.805258 kernel: audit: type=1327 audit(1734056596.795:749): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.808000 audit[3446]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.808000 audit[3446]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcdb6beb20 a2=0 a3=0 items=0 ppid=2364 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.821385 kernel: audit: type=1325 audit(1734056596.808:750): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.821519 kernel: audit: type=1300 audit(1734056596.808:750): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcdb6beb20 a2=0 a3=0 items=0 ppid=2364 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.821616 kernel: audit: type=1327 audit(1734056596.808:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.830000 audit[3448]: NETFILTER_CFG table=filter:79 family=2 entries=32 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.830000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd735819d0 a2=0 a3=7ffd735819bc items=0 ppid=2364 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.838977 kernel: audit: type=1325 audit(1734056596.830:751): table=filter:79 family=2 entries=32 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.839046 kernel: audit: type=1300 audit(1734056596.830:751): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd735819d0 a2=0 a3=7ffd735819bc items=0 ppid=2364 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.839094 kernel: audit: type=1327 audit(1734056596.830:751): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.842000 audit[3448]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.842000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd735819d0 a2=0 a3=0 items=0 ppid=2364 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.847098 kernel: audit: type=1325 audit(1734056596.842:752): table=nat:80 family=2 entries=22 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:17.068690 kubelet[2107]: I1213 02:23:17.067889 2107 topology_manager.go:215] "Topology Admit Handler" podUID="ed5c42c2-9f3e-407e-8de3-235836803af7" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 02:23:17.073938 systemd[1]: Created slice kubepods-besteffort-poded5c42c2_9f3e_407e_8de3_235836803af7.slice. Dec 13 02:23:17.087864 kubelet[2107]: I1213 02:23:17.087825 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6xlcm\" (UniqueName: \"kubernetes.io/projected/ed5c42c2-9f3e-407e-8de3-235836803af7-kube-api-access-6xlcm\") pod \"nfs-server-provisioner-0\" (UID: \"ed5c42c2-9f3e-407e-8de3-235836803af7\") " pod="default/nfs-server-provisioner-0" Dec 13 02:23:17.087864 kubelet[2107]: I1213 02:23:17.087871 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ed5c42c2-9f3e-407e-8de3-235836803af7-data\") pod \"nfs-server-provisioner-0\" (UID: \"ed5c42c2-9f3e-407e-8de3-235836803af7\") " pod="default/nfs-server-provisioner-0" Dec 13 02:23:17.378373 env[1717]: time="2024-12-13T02:23:17.378248396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed5c42c2-9f3e-407e-8de3-235836803af7,Namespace:default,Attempt:0,}" Dec 13 02:23:17.429744 kubelet[2107]: E1213 02:23:17.429693 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:17.552961 systemd-networkd[1457]: cali60e51b789ff: Link UP Dec 13 02:23:17.555977 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:23:17.556106 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 02:23:17.556273 systemd-networkd[1457]: cali60e51b789ff: Gained carrier Dec 13 02:23:17.556688 (udev-worker)[3468]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.449 [INFO][3451] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.209-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ed5c42c2-9f3e-407e-8de3-235836803af7 1104 0 2024-12-13 02:23:17 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.21.209 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.450 [INFO][3451] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.491 [INFO][3462] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" HandleID="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Workload="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.505 [INFO][3462] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" HandleID="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Workload="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ae90), Attrs:map[string]string{"namespace":"default", "node":"172.31.21.209", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:23:17.491333875 +0000 UTC"}, Hostname:"172.31.21.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.505 [INFO][3462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.505 [INFO][3462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.505 [INFO][3462] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.209' Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.508 [INFO][3462] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.514 [INFO][3462] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.521 [INFO][3462] ipam/ipam.go 489: Trying affinity for 192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.524 [INFO][3462] ipam/ipam.go 155: Attempting to load block cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.527 [INFO][3462] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.527 [INFO][3462] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.114.0/26 handle="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.530 [INFO][3462] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5 Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.536 [INFO][3462] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.114.0/26 handle="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.547 [INFO][3462] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.114.3/26] block=192.168.114.0/26 handle="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.547 [INFO][3462] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.114.3/26] handle="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" host="172.31.21.209" Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.547 [INFO][3462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:17.574961 env[1717]: 2024-12-13 02:23:17.547 [INFO][3462] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.114.3/26] IPv6=[] ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" HandleID="k8s-pod-network.c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Workload="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.576595 env[1717]: 2024-12-13 02:23:17.549 [INFO][3451] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed5c42c2-9f3e-407e-8de3-235836803af7", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 23, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.114.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:17.576595 env[1717]: 2024-12-13 02:23:17.549 [INFO][3451] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.114.3/32] ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.576595 env[1717]: 2024-12-13 02:23:17.549 [INFO][3451] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.576595 env[1717]: 2024-12-13 02:23:17.557 [INFO][3451] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.576882 env[1717]: 2024-12-13 02:23:17.558 [INFO][3451] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed5c42c2-9f3e-407e-8de3-235836803af7", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 23, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.114.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"22:b9:c2:1a:81:1d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:17.576882 env[1717]: 2024-12-13 02:23:17.573 [INFO][3451] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.209-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:23:17.598573 env[1717]: time="2024-12-13T02:23:17.598280564Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:23:17.598573 env[1717]: time="2024-12-13T02:23:17.598340506Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:23:17.598573 env[1717]: time="2024-12-13T02:23:17.598356471Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:23:17.598997 env[1717]: time="2024-12-13T02:23:17.598938619Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5 pid=3490 runtime=io.containerd.runc.v2 Dec 13 02:23:17.606000 audit[3496]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:23:17.606000 audit[3496]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc0375d520 a2=0 a3=7ffc0375d50c items=0 ppid=2786 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.606000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:23:17.632912 systemd[1]: run-containerd-runc-k8s.io-c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5-runc.vOtWtL.mount: Deactivated successfully. Dec 13 02:23:17.641117 systemd[1]: Started cri-containerd-c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5.scope. Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.661000 audit: BPF prog-id=124 op=LOAD Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3490 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331343437653833303762626662343639613835323430366365643639 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3490 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331343437653833303762626662343639613835323430366365643639 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.663000 audit: BPF prog-id=125 op=LOAD Dec 13 02:23:17.663000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035a7b0 items=0 ppid=3490 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331343437653833303762626662343639613835323430366365643639 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.664000 audit: BPF prog-id=126 op=LOAD Dec 13 02:23:17.664000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035a7f8 items=0 ppid=3490 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331343437653833303762626662343639613835323430366365643639 Dec 13 02:23:17.665000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:23:17.665000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:17.666000 audit: BPF prog-id=127 op=LOAD Dec 13 02:23:17.666000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035ac08 items=0 ppid=3490 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331343437653833303762626662343639613835323430366365643639 Dec 13 02:23:17.701702 env[1717]: time="2024-12-13T02:23:17.701655431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed5c42c2-9f3e-407e-8de3-235836803af7,Namespace:default,Attempt:0,} returns sandbox id \"c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5\"" Dec 13 02:23:17.703693 env[1717]: time="2024-12-13T02:23:17.703662739Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 02:23:17.865000 audit[3531]: NETFILTER_CFG table=filter:82 family=2 entries=32 op=nft_register_rule pid=3531 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:17.865000 audit[3531]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffed96feaa0 a2=0 a3=7ffed96fea8c items=0 ppid=2364 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:17.871000 audit[3531]: NETFILTER_CFG table=nat:83 family=2 entries=34 op=nft_register_chain pid=3531 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:17.871000 audit[3531]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffed96feaa0 a2=0 a3=7ffed96fea8c items=0 ppid=2364 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:18.430203 kubelet[2107]: E1213 02:23:18.430165 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:19.149940 systemd-networkd[1457]: cali60e51b789ff: Gained IPv6LL Dec 13 02:23:19.432258 kubelet[2107]: E1213 02:23:19.431783 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:20.432600 kubelet[2107]: E1213 02:23:20.432535 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:20.988225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount567123246.mount: Deactivated successfully. Dec 13 02:23:21.434510 kubelet[2107]: E1213 02:23:21.434396 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:22.434657 kubelet[2107]: E1213 02:23:22.434615 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:23.435170 kubelet[2107]: E1213 02:23:23.435109 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:23.578356 env[1717]: time="2024-12-13T02:23:23.578308492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:23.584098 env[1717]: time="2024-12-13T02:23:23.583935456Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:23.586561 env[1717]: time="2024-12-13T02:23:23.586522896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:23.589606 env[1717]: time="2024-12-13T02:23:23.589569608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:23.590735 env[1717]: time="2024-12-13T02:23:23.590694411Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 02:23:23.599696 env[1717]: time="2024-12-13T02:23:23.599620312Z" level=info msg="CreateContainer within sandbox \"c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 02:23:23.622738 env[1717]: time="2024-12-13T02:23:23.622671759Z" level=info msg="CreateContainer within sandbox \"c1447e8307bbfb469a852406ced69b92f50469457ce3af0c5eb8d20d3640a3d5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e44891480dac1ec5916a0318b02fba89656f5328534907bf3f0fcb241042d264\"" Dec 13 02:23:23.623952 env[1717]: time="2024-12-13T02:23:23.623923751Z" level=info msg="StartContainer for \"e44891480dac1ec5916a0318b02fba89656f5328534907bf3f0fcb241042d264\"" Dec 13 02:23:23.663035 systemd[1]: Started cri-containerd-e44891480dac1ec5916a0318b02fba89656f5328534907bf3f0fcb241042d264.scope. Dec 13 02:23:23.688121 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:23:23.688252 kernel: audit: type=1400 audit(1734056603.684:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.694119 kernel: audit: type=1400 audit(1734056603.684:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.702861 kernel: audit: type=1400 audit(1734056603.684:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.702982 kernel: audit: type=1400 audit(1734056603.684:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.710554 kernel: audit: type=1400 audit(1734056603.684:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.710627 kernel: audit: type=1400 audit(1734056603.684:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.722112 kernel: audit: type=1400 audit(1734056603.684:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.722418 env[1717]: time="2024-12-13T02:23:23.722373552Z" level=info msg="StartContainer for \"e44891480dac1ec5916a0318b02fba89656f5328534907bf3f0fcb241042d264\" returns successfully" Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.731160 kernel: audit: type=1400 audit(1734056603.684:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.731258 kernel: audit: type=1400 audit(1734056603.684:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.734799 kernel: audit: type=1400 audit(1734056603.685:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.685000 audit: BPF prog-id=128 op=LOAD Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3490 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534343839313438306461633165633539313661303331386230326662 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3490 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534343839313438306461633165633539313661303331386230326662 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit: BPF prog-id=129 op=LOAD Dec 13 02:23:23.688000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a06d0 items=0 ppid=3490 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534343839313438306461633165633539313661303331386230326662 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.688000 audit: BPF prog-id=130 op=LOAD Dec 13 02:23:23.688000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a0718 items=0 ppid=3490 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534343839313438306461633165633539313661303331386230326662 Dec 13 02:23:23.689000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:23:23.689000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:23.689000 audit: BPF prog-id=131 op=LOAD Dec 13 02:23:23.689000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0b28 items=0 ppid=3490 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534343839313438306461633165633539313661303331386230326662 Dec 13 02:23:23.771000 audit[3568]: AVC avc: denied { search } for pid=3568 comm="rpcbind" name="crypto" dev="proc" ino=23851 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:23:23.771000 audit[3568]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fcf445e20c0 a2=0 a3=0 items=0 ppid=3553 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 key=(null) Dec 13 02:23:23.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 02:23:23.816000 audit[3573]: AVC avc: denied { search } for pid=3573 comm="dbus-daemon" name="crypto" dev="proc" ino=23851 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:23:23.816000 audit[3573]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff8a24060c0 a2=0 a3=0 items=0 ppid=3553 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 key=(null) Dec 13 02:23:23.816000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:23:23.820000 audit[3574]: AVC avc: denied { watch } for pid=3574 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=20688 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c321,c648 tclass=dir permissive=0 Dec 13 02:23:23.820000 audit[3574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55bf79e0b940 a2=2c8 a3=7ffc292578cc items=0 ppid=3553 pid=3574 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 key=(null) Dec 13 02:23:23.820000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:23:23.827000 audit[3575]: AVC avc: denied { read } for pid=3575 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23942 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 02:23:23.827000 audit[3575]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3c7e750320 a1=80000 a2=d a3=7ffec2941970 items=0 ppid=3553 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 key=(null) Dec 13 02:23:23.827000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:23:23.827000 audit[3575]: AVC avc: denied { search } for pid=3575 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23851 scontext=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:23:23.827000 audit[3575]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f3c7dca40c0 a2=0 a3=0 items=0 ppid=3553 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c321,c648 key=(null) Dec 13 02:23:23.827000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:23:23.897781 kubelet[2107]: I1213 02:23:23.897725 2107 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.007348548 podStartE2EDuration="6.897708637s" podCreationTimestamp="2024-12-13 02:23:17 +0000 UTC" firstStartedPulling="2024-12-13 02:23:17.703177623 +0000 UTC m=+44.834633167" lastFinishedPulling="2024-12-13 02:23:23.593537699 +0000 UTC m=+50.724993256" observedRunningTime="2024-12-13 02:23:23.897338205 +0000 UTC m=+51.028793771" watchObservedRunningTime="2024-12-13 02:23:23.897708637 +0000 UTC m=+51.029164199" Dec 13 02:23:23.914000 audit[3580]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:23.914000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0b9b2e00 a2=0 a3=7ffd0b9b2dec items=0 ppid=2364 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:23.920000 audit[3580]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:23.920000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd0b9b2e00 a2=0 a3=7ffd0b9b2dec items=0 ppid=2364 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:24.436249 kubelet[2107]: E1213 02:23:24.436209 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:25.436582 kubelet[2107]: E1213 02:23:25.436544 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:26.436742 kubelet[2107]: E1213 02:23:26.436688 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:27.437345 kubelet[2107]: E1213 02:23:27.437303 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:28.437760 kubelet[2107]: E1213 02:23:28.437704 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:29.438733 kubelet[2107]: E1213 02:23:29.438679 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:30.439334 kubelet[2107]: E1213 02:23:30.439244 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:31.440280 kubelet[2107]: E1213 02:23:31.440236 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:32.440871 kubelet[2107]: E1213 02:23:32.440826 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:33.384460 kubelet[2107]: E1213 02:23:33.384412 2107 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:33.421785 env[1717]: time="2024-12-13T02:23:33.421744477Z" level=info msg="StopPodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\"" Dec 13 02:23:33.441883 kubelet[2107]: E1213 02:23:33.441826 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.489 [WARNING][3599] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-csi--node--driver--m2pph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85", Pod:"csi-node-driver-m2pph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.114.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid31898013bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.489 [INFO][3599] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.489 [INFO][3599] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" iface="eth0" netns="" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.489 [INFO][3599] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.489 [INFO][3599] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.512 [INFO][3605] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.512 [INFO][3605] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.512 [INFO][3605] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.525 [WARNING][3605] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.525 [INFO][3605] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.527 [INFO][3605] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:33.530681 env[1717]: 2024-12-13 02:23:33.529 [INFO][3599] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.531460 env[1717]: time="2024-12-13T02:23:33.530770552Z" level=info msg="TearDown network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" successfully" Dec 13 02:23:33.531460 env[1717]: time="2024-12-13T02:23:33.530828375Z" level=info msg="StopPodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" returns successfully" Dec 13 02:23:33.541026 env[1717]: time="2024-12-13T02:23:33.540991048Z" level=info msg="RemovePodSandbox for \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\"" Dec 13 02:23:33.541252 env[1717]: time="2024-12-13T02:23:33.541169154Z" level=info msg="Forcibly stopping sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\"" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.582 [WARNING][3625] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-csi--node--driver--m2pph-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6f699b5e-b2f5-4f21-9ab6-c6f4139ec319", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"a32a9974f3ef9d1898ed2486097fc93f2a24eb44bb69282850ef5da258c93d85", Pod:"csi-node-driver-m2pph", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.114.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid31898013bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.582 [INFO][3625] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.582 [INFO][3625] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" iface="eth0" netns="" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.582 [INFO][3625] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.582 [INFO][3625] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.608 [INFO][3631] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.609 [INFO][3631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.609 [INFO][3631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.634 [WARNING][3631] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.634 [INFO][3631] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" HandleID="k8s-pod-network.9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Workload="172.31.21.209-k8s-csi--node--driver--m2pph-eth0" Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.636 [INFO][3631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:33.643297 env[1717]: 2024-12-13 02:23:33.640 [INFO][3625] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf" Dec 13 02:23:33.644116 env[1717]: time="2024-12-13T02:23:33.644047287Z" level=info msg="TearDown network for sandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" successfully" Dec 13 02:23:33.648413 env[1717]: time="2024-12-13T02:23:33.648369097Z" level=info msg="RemovePodSandbox \"9f9caf6d8a2dfe044c0b723bb616e15de211f8568b9890a7fb7f6ef304546abf\" returns successfully" Dec 13 02:23:33.649196 env[1717]: time="2024-12-13T02:23:33.649166763Z" level=info msg="StopPodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\"" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.718 [WARNING][3651] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e807f94b-8319-495f-9c57-f3b2422ad643", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125", Pod:"nginx-deployment-85f456d6dd-nbg7l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.114.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie2989de7a29", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.718 [INFO][3651] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.718 [INFO][3651] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" iface="eth0" netns="" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.718 [INFO][3651] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.718 [INFO][3651] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.747 [INFO][3658] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.747 [INFO][3658] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.747 [INFO][3658] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.764 [WARNING][3658] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.764 [INFO][3658] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.768 [INFO][3658] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:33.770594 env[1717]: 2024-12-13 02:23:33.769 [INFO][3651] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.771404 env[1717]: time="2024-12-13T02:23:33.770633900Z" level=info msg="TearDown network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" successfully" Dec 13 02:23:33.771404 env[1717]: time="2024-12-13T02:23:33.770676455Z" level=info msg="StopPodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" returns successfully" Dec 13 02:23:33.771404 env[1717]: time="2024-12-13T02:23:33.771358897Z" level=info msg="RemovePodSandbox for \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\"" Dec 13 02:23:33.771536 env[1717]: time="2024-12-13T02:23:33.771396710Z" level=info msg="Forcibly stopping sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\"" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.817 [WARNING][3676] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"e807f94b-8319-495f-9c57-f3b2422ad643", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"4773dbe1aceb25f82636b89fa99fc1041ff2236f8ba6d0798847d7fbceedb125", Pod:"nginx-deployment-85f456d6dd-nbg7l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.114.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie2989de7a29", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.818 [INFO][3676] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.818 [INFO][3676] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" iface="eth0" netns="" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.818 [INFO][3676] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.818 [INFO][3676] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.840 [INFO][3682] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.840 [INFO][3682] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.840 [INFO][3682] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.866 [WARNING][3682] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.866 [INFO][3682] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" HandleID="k8s-pod-network.fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Workload="172.31.21.209-k8s-nginx--deployment--85f456d6dd--nbg7l-eth0" Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.870 [INFO][3682] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:33.874616 env[1717]: 2024-12-13 02:23:33.872 [INFO][3676] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f" Dec 13 02:23:33.875585 env[1717]: time="2024-12-13T02:23:33.874641166Z" level=info msg="TearDown network for sandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" successfully" Dec 13 02:23:33.880404 env[1717]: time="2024-12-13T02:23:33.880357338Z" level=info msg="RemovePodSandbox \"fc6e066886df9c8e0588aec2f3fbc660faefb333db6628705de9873bd494754f\" returns successfully" Dec 13 02:23:34.442942 kubelet[2107]: E1213 02:23:34.442897 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:35.443431 kubelet[2107]: E1213 02:23:35.443388 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:36.443744 kubelet[2107]: E1213 02:23:36.443692 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:37.444868 kubelet[2107]: E1213 02:23:37.444814 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:38.445500 kubelet[2107]: E1213 02:23:38.445460 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:39.445679 kubelet[2107]: E1213 02:23:39.445626 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:40.447868 kubelet[2107]: E1213 02:23:40.447810 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:41.448690 kubelet[2107]: E1213 02:23:41.448635 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:42.449188 kubelet[2107]: E1213 02:23:42.449146 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:43.449290 kubelet[2107]: E1213 02:23:43.449226 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:44.450534 kubelet[2107]: E1213 02:23:44.450479 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:45.451265 kubelet[2107]: E1213 02:23:45.451221 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:46.452915 kubelet[2107]: E1213 02:23:46.451613 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:47.452290 kubelet[2107]: E1213 02:23:47.452238 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:48.218259 kubelet[2107]: I1213 02:23:48.218092 2107 topology_manager.go:215] "Topology Admit Handler" podUID="9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7" podNamespace="default" podName="test-pod-1" Dec 13 02:23:48.228908 systemd[1]: Created slice kubepods-besteffort-pod9611718d_d8b5_4b1e_9836_ee2e8c2bfaa7.slice. Dec 13 02:23:48.295386 kubelet[2107]: I1213 02:23:48.295343 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h7jhg\" (UniqueName: \"kubernetes.io/projected/9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7-kube-api-access-h7jhg\") pod \"test-pod-1\" (UID: \"9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7\") " pod="default/test-pod-1" Dec 13 02:23:48.295790 kubelet[2107]: I1213 02:23:48.295403 2107 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-4e7eca40-8298-4914-ad0b-b77077d1d029\" (UniqueName: \"kubernetes.io/nfs/9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7-pvc-4e7eca40-8298-4914-ad0b-b77077d1d029\") pod \"test-pod-1\" (UID: \"9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7\") " pod="default/test-pod-1" Dec 13 02:23:48.438133 kernel: Failed to create system directory netfs Dec 13 02:23:48.438330 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:23:48.438369 kernel: audit: type=1400 audit(1734056628.434:799): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.434000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.443263 kernel: Failed to create system directory netfs Dec 13 02:23:48.443369 kernel: audit: type=1400 audit(1734056628.434:799): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.434000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.448992 kernel: Failed to create system directory netfs Dec 13 02:23:48.449130 kernel: audit: type=1400 audit(1734056628.434:799): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.434000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.453885 kernel: Failed to create system directory netfs Dec 13 02:23:48.453993 kernel: audit: type=1400 audit(1734056628.434:799): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.434000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.459006 kubelet[2107]: E1213 02:23:48.458953 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:48.434000 audit[3744]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dd039b65e0 a1=153bc a2=55dccf5652b0 a3=5 items=0 ppid=1423 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:48.434000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:23:48.468099 kernel: audit: type=1300 audit(1734056628.434:799): arch=c000003e syscall=175 success=yes exit=0 a0=55dd039b65e0 a1=153bc a2=55dccf5652b0 a3=5 items=0 ppid=1423 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:48.468184 kernel: audit: type=1327 audit(1734056628.434:799): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:23:48.487389 kernel: Failed to create system directory fscache Dec 13 02:23:48.487539 kernel: audit: type=1400 audit(1734056628.473:800): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.487574 kernel: Failed to create system directory fscache Dec 13 02:23:48.487607 kernel: audit: type=1400 audit(1734056628.473:800): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.487635 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.494616 kernel: audit: type=1400 audit(1734056628.473:800): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.494733 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.499230 kernel: audit: type=1400 audit(1734056628.473:800): avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.499355 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.500185 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.501865 kernel: Failed to create system directory fscache Dec 13 02:23:48.501906 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.503765 kernel: Failed to create system directory fscache Dec 13 02:23:48.503809 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.506608 kernel: Failed to create system directory fscache Dec 13 02:23:48.506698 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.509090 kernel: Failed to create system directory fscache Dec 13 02:23:48.509152 kernel: Failed to create system directory fscache Dec 13 02:23:48.473000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.473000 audit[3744]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dd03bcb9c0 a1=4c0fc a2=55dccf5652b0 a3=5 items=0 ppid=1423 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:48.473000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:23:48.512098 kernel: FS-Cache: Loaded Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.577276 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.577365 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.577395 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.579528 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.579599 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.583901 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.584005 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.584038 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.589859 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.589955 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.592135 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.592190 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.593736 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.593770 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.596702 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.596775 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.605579 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.605711 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.611695 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.611807 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.615755 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.618135 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.618190 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.619796 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.619867 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.621415 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.621461 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.623916 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.623985 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.624018 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.624835 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.625596 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.627222 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.627286 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.629794 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.629841 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.629906 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.631919 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.632180 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.633011 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.634600 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.634658 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.636319 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.636366 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.638853 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.638915 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.638946 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.640575 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.640618 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.642182 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.642232 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.643944 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.643997 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.645693 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.645761 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.647499 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.647545 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.649355 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.649400 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.651414 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.651477 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.653272 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.653329 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.654104 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.655860 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.655920 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.657512 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.657569 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.659190 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.659242 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.660898 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.660947 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.662537 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.662577 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.664702 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.664755 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.666279 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.666325 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.667945 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.667996 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.669534 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.669569 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.672363 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.672434 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.672465 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.675064 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.675131 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.675201 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.676849 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.676928 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.678472 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.678507 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.680237 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.680291 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.681802 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.681845 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.683523 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.683568 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.685217 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.685287 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.686839 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.686877 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.688438 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.688478 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.690892 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.690941 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.690993 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.692540 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.692585 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.694218 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.694254 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.695872 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.695916 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.697650 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.697694 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.699239 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.699280 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.700920 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.700961 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.702410 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.702525 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.704208 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.704246 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.705771 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.705808 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.539000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.708347 kernel: Failed to create system directory sunrpc Dec 13 02:23:48.720108 kernel: RPC: Registered named UNIX socket transport module. Dec 13 02:23:48.720215 kernel: RPC: Registered udp transport module. Dec 13 02:23:48.720243 kernel: RPC: Registered tcp transport module. Dec 13 02:23:48.720291 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 02:23:48.539000 audit[3744]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dd03c17ad0 a1=1a7f1c a2=55dccf5652b0 a3=5 items=6 ppid=1423 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:48.539000 audit: CWD cwd="/" Dec 13 02:23:48.539000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:23:48.539000 audit: PATH item=1 name=(null) inode=24281 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:23:48.539000 audit: PATH item=2 name=(null) inode=24281 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:23:48.539000 audit: PATH item=3 name=(null) inode=24282 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:23:48.539000 audit: PATH item=4 name=(null) inode=24281 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:23:48.539000 audit: PATH item=5 name=(null) inode=24283 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:23:48.539000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.781117 kernel: Failed to create system directory nfs Dec 13 02:23:48.781226 kernel: Failed to create system directory nfs Dec 13 02:23:48.781308 kernel: Failed to create system directory nfs Dec 13 02:23:48.781335 kernel: Failed to create system directory nfs Dec 13 02:23:48.781357 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.782722 kernel: Failed to create system directory nfs Dec 13 02:23:48.782778 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.784391 kernel: Failed to create system directory nfs Dec 13 02:23:48.784439 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.786125 kernel: Failed to create system directory nfs Dec 13 02:23:48.786177 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.787663 kernel: Failed to create system directory nfs Dec 13 02:23:48.787700 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.789251 kernel: Failed to create system directory nfs Dec 13 02:23:48.789289 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.790786 kernel: Failed to create system directory nfs Dec 13 02:23:48.790835 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.792573 kernel: Failed to create system directory nfs Dec 13 02:23:48.792645 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.793358 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.794797 kernel: Failed to create system directory nfs Dec 13 02:23:48.794849 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.796348 kernel: Failed to create system directory nfs Dec 13 02:23:48.796407 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.797149 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.798829 kernel: Failed to create system directory nfs Dec 13 02:23:48.798901 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.800614 kernel: Failed to create system directory nfs Dec 13 02:23:48.800665 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.802320 kernel: Failed to create system directory nfs Dec 13 02:23:48.802384 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.804799 kernel: Failed to create system directory nfs Dec 13 02:23:48.804842 kernel: Failed to create system directory nfs Dec 13 02:23:48.804879 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.806308 kernel: Failed to create system directory nfs Dec 13 02:23:48.806347 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.807897 kernel: Failed to create system directory nfs Dec 13 02:23:48.807946 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.809829 kernel: Failed to create system directory nfs Dec 13 02:23:48.809883 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.811419 kernel: Failed to create system directory nfs Dec 13 02:23:48.811471 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.813972 kernel: Failed to create system directory nfs Dec 13 02:23:48.814231 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.815136 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.816782 kernel: Failed to create system directory nfs Dec 13 02:23:48.816825 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.818362 kernel: Failed to create system directory nfs Dec 13 02:23:48.818403 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.820595 kernel: Failed to create system directory nfs Dec 13 02:23:48.820652 kernel: Failed to create system directory nfs Dec 13 02:23:48.820683 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.822387 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.823270 kernel: Failed to create system directory nfs Dec 13 02:23:48.823348 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.824823 kernel: Failed to create system directory nfs Dec 13 02:23:48.824877 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.826418 kernel: Failed to create system directory nfs Dec 13 02:23:48.826465 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.762000 audit[3744]: AVC avc: denied { confidentiality } for pid=3744 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.828101 kernel: Failed to create system directory nfs Dec 13 02:23:48.762000 audit[3744]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dd03e38700 a1=16e97c a2=55dccf5652b0 a3=5 items=0 ppid=1423 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:48.854216 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 02:23:48.762000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.906772 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.906851 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.906883 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.908399 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.908447 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.910747 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.910864 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.910891 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.912382 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.912431 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.915355 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.915418 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.915447 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.916823 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.916868 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.918349 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.918380 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.920686 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.920724 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.920821 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.922214 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.922249 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.923790 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.923831 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.925287 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.925338 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.926902 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.926943 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.928146 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.934915 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.938350 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.938767 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.939851 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.946520 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.946630 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.948346 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.948396 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.953748 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.953820 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.955379 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.960902 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.960988 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.962576 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.967874 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.967985 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.970117 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.972487 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.980781 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.980871 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.986429 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.986521 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.987757 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.994554 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.994634 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.999592 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.999709 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.999740 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.001877 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.001927 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.001978 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.003412 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.003481 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.005243 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.005299 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.006742 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.006800 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.008436 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.008487 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.011122 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.011303 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.011348 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.013179 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.013230 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.014823 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.014884 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.016618 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.016697 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.018264 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.018310 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.019823 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.019866 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.021748 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.021795 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.023378 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.023429 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.025916 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.025965 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.026010 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.027628 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.027671 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.029468 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.029551 kernel: Failed to create system directory nfs4 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:48.887000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.031785 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.031896 kernel: Failed to create system directory nfs4 Dec 13 02:23:49.228522 kernel: NFS: Registering the id_resolver key type Dec 13 02:23:49.228688 kernel: Key type id_resolver registered Dec 13 02:23:49.228718 kernel: Key type id_legacy registered Dec 13 02:23:48.887000 audit[3749]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff9f8b22010 a1=208de4 a2=55b24eb3e2b0 a3=5 items=0 ppid=1423 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:48.887000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.248901 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.248989 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.249069 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.249120 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.249689 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.251515 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.251651 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.253403 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.253486 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.255922 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.255970 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.256011 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.257483 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.257516 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.259952 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.259993 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.260043 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.261599 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.261650 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.263204 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.263243 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.264872 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.264917 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.266509 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.266566 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.241000 audit[3750]: AVC avc: denied { confidentiality } for pid=3750 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:23:49.268172 kernel: Failed to create system directory rpcgss Dec 13 02:23:49.241000 audit[3750]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f191f59b010 a1=70af4 a2=55c4d30d12b0 a3=5 items=0 ppid=1423 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.241000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 02:23:49.299450 nfsidmap[3758]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 02:23:49.305048 nfsidmap[3760]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 02:23:49.319000 audit[1920]: AVC avc: denied { watch_reads } for pid=1920 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:23:49.319000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5580594382a0 a2=10 a3=80291601b1ded074 items=0 ppid=1 pid=1920 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.319000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:23:49.319000 audit[1920]: AVC avc: denied { watch_reads } for pid=1920 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:23:49.319000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5580594382a0 a2=10 a3=80291601b1ded074 items=0 ppid=1 pid=1920 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.319000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:23:49.319000 audit[1920]: AVC avc: denied { watch_reads } for pid=1920 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:23:49.319000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5580594382a0 a2=10 a3=80291601b1ded074 items=0 ppid=1 pid=1920 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.319000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:23:49.320000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:23:49.320000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:23:49.320000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:23:49.433340 env[1717]: time="2024-12-13T02:23:49.433296720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7,Namespace:default,Attempt:0,}" Dec 13 02:23:49.459437 kubelet[2107]: E1213 02:23:49.459363 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:49.596835 (udev-worker)[3751]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:23:49.598687 systemd-networkd[1457]: cali5ec59c6bf6e: Link UP Dec 13 02:23:49.602022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:23:49.602153 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 02:23:49.602277 systemd-networkd[1457]: cali5ec59c6bf6e: Gained carrier Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.498 [INFO][3761] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.209-k8s-test--pod--1-eth0 default 9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7 1220 0 2024-12-13 02:23:18 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.21.209 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.498 [INFO][3761] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.542 [INFO][3773] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" HandleID="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Workload="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.556 [INFO][3773] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" HandleID="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Workload="172.31.21.209-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ecdd0), Attrs:map[string]string{"namespace":"default", "node":"172.31.21.209", "pod":"test-pod-1", "timestamp":"2024-12-13 02:23:49.542751401 +0000 UTC"}, Hostname:"172.31.21.209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.556 [INFO][3773] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.556 [INFO][3773] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.556 [INFO][3773] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.209' Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.559 [INFO][3773] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.563 [INFO][3773] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.570 [INFO][3773] ipam/ipam.go 489: Trying affinity for 192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.573 [INFO][3773] ipam/ipam.go 155: Attempting to load block cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.576 [INFO][3773] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.114.0/26 host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.577 [INFO][3773] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.114.0/26 handle="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.578 [INFO][3773] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971 Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.583 [INFO][3773] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.114.0/26 handle="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.592 [INFO][3773] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.114.4/26] block=192.168.114.0/26 handle="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.592 [INFO][3773] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.114.4/26] handle="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" host="172.31.21.209" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.592 [INFO][3773] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.592 [INFO][3773] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.114.4/26] IPv6=[] ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" HandleID="k8s-pod-network.59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Workload="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.613799 env[1717]: 2024-12-13 02:23:49.594 [INFO][3761] cni-plugin/k8s.go 386: Populated endpoint ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7", ResourceVersion:"1220", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.114.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:49.615407 env[1717]: 2024-12-13 02:23:49.594 [INFO][3761] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.114.4/32] ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.615407 env[1717]: 2024-12-13 02:23:49.594 [INFO][3761] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.615407 env[1717]: 2024-12-13 02:23:49.603 [INFO][3761] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.615407 env[1717]: 2024-12-13 02:23:49.603 [INFO][3761] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.209-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7", ResourceVersion:"1220", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.209", ContainerID:"59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.114.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"9e:ee:11:af:be:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:23:49.615407 env[1717]: 2024-12-13 02:23:49.612 [INFO][3761] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.209-k8s-test--pod--1-eth0" Dec 13 02:23:49.636000 audit[3794]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=3794 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:23:49.636000 audit[3794]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe92b6dca0 a2=0 a3=7ffe92b6dc8c items=0 ppid=2786 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:23:49.639799 env[1717]: time="2024-12-13T02:23:49.639723717Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:23:49.639951 env[1717]: time="2024-12-13T02:23:49.639762687Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:23:49.639951 env[1717]: time="2024-12-13T02:23:49.639794186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:23:49.640133 env[1717]: time="2024-12-13T02:23:49.640104316Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971 pid=3801 runtime=io.containerd.runc.v2 Dec 13 02:23:49.671943 systemd[1]: run-containerd-runc-k8s.io-59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971-runc.Ul1UJe.mount: Deactivated successfully. Dec 13 02:23:49.676639 systemd[1]: Started cri-containerd-59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971.scope. Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.697000 audit: BPF prog-id=132 op=LOAD Dec 13 02:23:49.698000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.698000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3801 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633737643537396133316138353034656139663838626565333661 Dec 13 02:23:49.698000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.698000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3801 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633737643537396133316138353034656139663838626565333661 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit: BPF prog-id=133 op=LOAD Dec 13 02:23:49.699000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024a470 items=0 ppid=3801 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633737643537396133316138353034656139663838626565333661 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.699000 audit: BPF prog-id=134 op=LOAD Dec 13 02:23:49.699000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024a4b8 items=0 ppid=3801 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633737643537396133316138353034656139663838626565333661 Dec 13 02:23:49.700000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:23:49.700000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:49.700000 audit: BPF prog-id=135 op=LOAD Dec 13 02:23:49.700000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024a8c8 items=0 ppid=3801 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:49.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633737643537396133316138353034656139663838626565333661 Dec 13 02:23:49.737199 env[1717]: time="2024-12-13T02:23:49.737156156Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9611718d-d8b5-4b1e-9836-ee2e8c2bfaa7,Namespace:default,Attempt:0,} returns sandbox id \"59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971\"" Dec 13 02:23:49.745682 env[1717]: time="2024-12-13T02:23:49.745646082Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:23:50.065975 env[1717]: time="2024-12-13T02:23:50.065929756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:50.069271 env[1717]: time="2024-12-13T02:23:50.069230504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:50.072057 env[1717]: time="2024-12-13T02:23:50.072019253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:50.074590 env[1717]: time="2024-12-13T02:23:50.074555975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:23:50.075435 env[1717]: time="2024-12-13T02:23:50.075400998Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:23:50.079434 env[1717]: time="2024-12-13T02:23:50.079402628Z" level=info msg="CreateContainer within sandbox \"59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 02:23:50.111868 env[1717]: time="2024-12-13T02:23:50.111813977Z" level=info msg="CreateContainer within sandbox \"59c77d579a31a8504ea9f88bee36ad74de45a3eb385b4bbe87dd46762f4cb971\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"ba374aa6d6a508d595bfa801a458ae2a820fac1711497f16bccb2853370a143c\"" Dec 13 02:23:50.112645 env[1717]: time="2024-12-13T02:23:50.112617469Z" level=info msg="StartContainer for \"ba374aa6d6a508d595bfa801a458ae2a820fac1711497f16bccb2853370a143c\"" Dec 13 02:23:50.138213 systemd[1]: Started cri-containerd-ba374aa6d6a508d595bfa801a458ae2a820fac1711497f16bccb2853370a143c.scope. Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit: BPF prog-id=136 op=LOAD Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3801 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:50.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333734616136643661353038643539356266613830316134353861 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3801 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:50.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333734616136643661353038643539356266613830316134353861 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.162000 audit: BPF prog-id=137 op=LOAD Dec 13 02:23:50.162000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e0f10 items=0 ppid=3801 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:50.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333734616136643661353038643539356266613830316134353861 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit: BPF prog-id=138 op=LOAD Dec 13 02:23:50.163000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e0f58 items=0 ppid=3801 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:50.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333734616136643661353038643539356266613830316134353861 Dec 13 02:23:50.163000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:23:50.163000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:23:50.163000 audit: BPF prog-id=139 op=LOAD Dec 13 02:23:50.163000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e1368 items=0 ppid=3801 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:50.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333734616136643661353038643539356266613830316134353861 Dec 13 02:23:50.184567 env[1717]: time="2024-12-13T02:23:50.184504352Z" level=info msg="StartContainer for \"ba374aa6d6a508d595bfa801a458ae2a820fac1711497f16bccb2853370a143c\" returns successfully" Dec 13 02:23:50.460047 kubelet[2107]: E1213 02:23:50.459926 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:51.341406 systemd-networkd[1457]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 02:23:51.460493 kubelet[2107]: E1213 02:23:51.460441 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:52.460907 kubelet[2107]: E1213 02:23:52.460854 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:53.384274 kubelet[2107]: E1213 02:23:53.384224 2107 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:53.461929 kubelet[2107]: E1213 02:23:53.461882 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:54.462925 kubelet[2107]: E1213 02:23:54.462868 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:55.463461 kubelet[2107]: E1213 02:23:55.463408 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:56.464321 kubelet[2107]: E1213 02:23:56.464267 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:57.465205 kubelet[2107]: E1213 02:23:57.465153 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:58.466128 kubelet[2107]: E1213 02:23:58.466067 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:23:59.466971 kubelet[2107]: E1213 02:23:59.466918 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:00.467871 kubelet[2107]: E1213 02:24:00.467817 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:01.468227 kubelet[2107]: E1213 02:24:01.468168 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:02.468374 kubelet[2107]: E1213 02:24:02.468315 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:03.468570 kubelet[2107]: E1213 02:24:03.468514 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:04.469002 kubelet[2107]: E1213 02:24:04.468959 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:05.469416 kubelet[2107]: E1213 02:24:05.469366 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:06.469916 kubelet[2107]: E1213 02:24:06.469873 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:07.470891 kubelet[2107]: E1213 02:24:07.470845 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:08.471798 kubelet[2107]: E1213 02:24:08.471744 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:09.472106 kubelet[2107]: E1213 02:24:09.472042 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:10.472574 kubelet[2107]: E1213 02:24:10.472531 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:11.472857 kubelet[2107]: E1213 02:24:11.472795 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:12.473513 kubelet[2107]: E1213 02:24:12.473464 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:13.383750 kubelet[2107]: E1213 02:24:13.383696 2107 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:13.474559 kubelet[2107]: E1213 02:24:13.474500 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:14.475487 kubelet[2107]: E1213 02:24:14.475450 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:15.476040 kubelet[2107]: E1213 02:24:15.476000 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:15.545705 kubelet[2107]: E1213 02:24:15.545662 2107 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io 172.31.21.209)" Dec 13 02:24:16.236821 systemd[1]: run-containerd-runc-k8s.io-b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910-runc.5mqyii.mount: Deactivated successfully. Dec 13 02:24:16.476172 kubelet[2107]: E1213 02:24:16.476126 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:17.477201 kubelet[2107]: E1213 02:24:17.477161 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:18.311176 amazon-ssm-agent[1780]: 2024-12-13 02:24:18 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 02:24:18.477629 kubelet[2107]: E1213 02:24:18.477577 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:19.478198 kubelet[2107]: E1213 02:24:19.478143 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:20.478990 kubelet[2107]: E1213 02:24:20.478948 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:21.479482 kubelet[2107]: E1213 02:24:21.479431 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:22.480237 kubelet[2107]: E1213 02:24:22.480190 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:23.480858 kubelet[2107]: E1213 02:24:23.480808 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:24.481861 kubelet[2107]: E1213 02:24:24.481805 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:25.482172 kubelet[2107]: E1213 02:24:25.482117 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:25.546435 kubelet[2107]: E1213 02:24:25.546389 2107 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io 172.31.21.209)" Dec 13 02:24:26.482564 kubelet[2107]: E1213 02:24:26.482513 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:27.483549 kubelet[2107]: E1213 02:24:27.483463 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:28.484535 kubelet[2107]: E1213 02:24:28.484477 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:29.485624 kubelet[2107]: E1213 02:24:29.485514 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:30.486356 kubelet[2107]: E1213 02:24:30.486314 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:31.487382 kubelet[2107]: E1213 02:24:31.487332 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:32.488342 kubelet[2107]: E1213 02:24:32.488292 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:33.384278 kubelet[2107]: E1213 02:24:33.384232 2107 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:33.489019 kubelet[2107]: E1213 02:24:33.488942 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:34.190232 kubelet[2107]: E1213 02:24:34.190195 2107 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": unexpected EOF" Dec 13 02:24:34.193513 kubelet[2107]: E1213 02:24:34.193476 2107 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" Dec 13 02:24:34.194974 kubelet[2107]: E1213 02:24:34.194861 2107 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" Dec 13 02:24:34.194974 kubelet[2107]: I1213 02:24:34.194926 2107 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Dec 13 02:24:34.197366 kubelet[2107]: E1213 02:24:34.197173 2107 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="200ms" Dec 13 02:24:34.399282 kubelet[2107]: E1213 02:24:34.399101 2107 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="400ms" Dec 13 02:24:34.489709 kubelet[2107]: E1213 02:24:34.489584 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:34.812874 kubelet[2107]: E1213 02:24:34.812818 2107 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="800ms" Dec 13 02:24:35.489920 kubelet[2107]: E1213 02:24:35.489782 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:36.490971 kubelet[2107]: E1213 02:24:36.490928 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:37.491713 kubelet[2107]: E1213 02:24:37.491659 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:38.492222 kubelet[2107]: E1213 02:24:38.492170 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:39.493235 kubelet[2107]: E1213 02:24:39.493181 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:40.493762 kubelet[2107]: E1213 02:24:40.493705 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:41.494329 kubelet[2107]: E1213 02:24:41.494237 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:42.494993 kubelet[2107]: E1213 02:24:42.494937 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:43.495291 kubelet[2107]: E1213 02:24:43.495238 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:44.496123 kubelet[2107]: E1213 02:24:44.496060 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:45.496280 kubelet[2107]: E1213 02:24:45.496189 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:45.613229 kubelet[2107]: E1213 02:24:45.613180 2107 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.209?timeout=10s\": context deadline exceeded" interval="1.6s" Dec 13 02:24:45.862909 kubelet[2107]: E1213 02:24:45.862859 2107 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.209\": Get \"https://172.31.18.8:6443/api/v1/nodes/172.31.21.209?resourceVersion=0&timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Dec 13 02:24:46.264698 systemd[1]: run-containerd-runc-k8s.io-b934ac1e4de0c7d82377e6584f28ce04565669113d7549b1fc52e5b60ce88910-runc.017b04.mount: Deactivated successfully. Dec 13 02:24:46.497045 kubelet[2107]: E1213 02:24:46.496989 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:24:47.497420 kubelet[2107]: E1213 02:24:47.497326 2107 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"