Dec 13 14:31:54.173120 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:31:54.173153 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:31:54.173168 kernel: BIOS-provided physical RAM map: Dec 13 14:31:54.173180 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:31:54.173190 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:31:54.173202 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:31:54.173218 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 14:31:54.173229 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 14:31:54.173241 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 14:31:54.173252 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:31:54.173264 kernel: NX (Execute Disable) protection: active Dec 13 14:31:54.173275 kernel: SMBIOS 2.7 present. Dec 13 14:31:54.173287 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 14:31:54.173298 kernel: Hypervisor detected: KVM Dec 13 14:31:54.173315 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:31:54.173328 kernel: kvm-clock: cpu 0, msr 5519a001, primary cpu clock Dec 13 14:31:54.173341 kernel: kvm-clock: using sched offset of 7788512060 cycles Dec 13 14:31:54.173354 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:31:54.173367 kernel: tsc: Detected 2499.996 MHz processor Dec 13 14:31:54.173380 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:31:54.173396 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:31:54.173408 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 14:31:54.173422 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:31:54.173434 kernel: Using GB pages for direct mapping Dec 13 14:31:54.173447 kernel: ACPI: Early table checksum verification disabled Dec 13 14:31:54.173460 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 14:31:54.173473 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 14:31:54.173485 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:31:54.173498 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 14:31:54.173514 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 14:31:54.173527 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:31:54.173539 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:31:54.173552 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 14:31:54.173565 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:31:54.173578 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 14:31:54.173590 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 14:31:54.173603 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:31:54.173618 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 14:31:54.173631 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 14:31:54.173658 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 14:31:54.173674 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 14:31:54.173685 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 14:31:54.173698 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 14:31:54.173712 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 14:31:54.173728 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 14:31:54.173741 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 14:31:54.173755 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 14:31:54.173768 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:31:54.173781 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:31:54.173795 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 14:31:54.173808 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 14:31:54.173821 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 14:31:54.173837 kernel: Zone ranges: Dec 13 14:31:54.173851 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:31:54.173864 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 14:31:54.173878 kernel: Normal empty Dec 13 14:31:54.173892 kernel: Movable zone start for each node Dec 13 14:31:54.173906 kernel: Early memory node ranges Dec 13 14:31:54.173919 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:31:54.173933 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 14:31:54.173947 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 14:31:54.173963 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:31:54.173976 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:31:54.173990 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 14:31:54.174004 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:31:54.174017 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:31:54.174029 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 14:31:54.174042 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:31:54.174056 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:31:54.174069 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:31:54.174086 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:31:54.174099 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:31:54.174113 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:31:54.174127 kernel: TSC deadline timer available Dec 13 14:31:54.174140 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:31:54.174154 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 14:31:54.174167 kernel: Booting paravirtualized kernel on KVM Dec 13 14:31:54.174181 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:31:54.174196 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:31:54.174212 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:31:54.174226 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:31:54.174239 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:31:54.174252 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 14:31:54.174266 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:31:54.174280 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:31:54.174294 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 14:31:54.174308 kernel: Policy zone: DMA32 Dec 13 14:31:54.174323 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:31:54.174340 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:31:54.174354 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:31:54.174368 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:31:54.174381 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:31:54.174396 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123080K reserved, 0K cma-reserved) Dec 13 14:31:54.174410 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:31:54.174424 kernel: Kernel/User page tables isolation: enabled Dec 13 14:31:54.174437 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:31:54.174454 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:31:54.174468 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:31:54.174483 kernel: rcu: RCU event tracing is enabled. Dec 13 14:31:54.174497 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:31:54.174511 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:31:54.174525 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:31:54.174539 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:31:54.174553 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:31:54.174567 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:31:54.174583 kernel: random: crng init done Dec 13 14:31:54.174596 kernel: Console: colour VGA+ 80x25 Dec 13 14:31:54.174610 kernel: printk: console [ttyS0] enabled Dec 13 14:31:54.174624 kernel: ACPI: Core revision 20210730 Dec 13 14:31:54.174649 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 14:31:54.174664 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:31:54.174677 kernel: x2apic enabled Dec 13 14:31:54.174691 kernel: Switched APIC routing to physical x2apic. Dec 13 14:31:54.174705 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 14:31:54.174722 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Dec 13 14:31:54.174736 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:31:54.174750 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:31:54.174764 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:31:54.174788 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:31:54.174805 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:31:54.174819 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:31:54.174834 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:31:54.174848 kernel: RETBleed: Vulnerable Dec 13 14:31:54.174862 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:31:54.174877 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:31:54.174891 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:31:54.174905 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:31:54.174919 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:31:54.174936 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:31:54.174951 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:31:54.174965 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 14:31:54.174979 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 14:31:54.175060 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:31:54.175084 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:31:54.175103 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:31:54.175118 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 14:31:54.175132 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:31:54.175147 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 14:31:54.175161 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 14:31:54.175176 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 14:31:54.175190 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 14:31:54.175204 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 14:31:54.175218 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 14:31:54.175233 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 14:31:54.175247 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:31:54.175264 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:31:54.175278 kernel: LSM: Security Framework initializing Dec 13 14:31:54.175292 kernel: SELinux: Initializing. Dec 13 14:31:54.175307 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:31:54.175321 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:31:54.175336 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:31:54.175350 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:31:54.175365 kernel: signal: max sigframe size: 3632 Dec 13 14:31:54.175380 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:31:54.175394 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:31:54.175411 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:31:54.175425 kernel: x86: Booting SMP configuration: Dec 13 14:31:54.175440 kernel: .... node #0, CPUs: #1 Dec 13 14:31:54.175455 kernel: kvm-clock: cpu 1, msr 5519a041, secondary cpu clock Dec 13 14:31:54.175469 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 14:31:54.175485 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:31:54.175500 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:31:54.175515 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:31:54.175529 kernel: smpboot: Max logical packages: 1 Dec 13 14:31:54.175546 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Dec 13 14:31:54.175560 kernel: devtmpfs: initialized Dec 13 14:31:54.175622 kernel: x86/mm: Memory block size: 128MB Dec 13 14:31:54.175658 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:31:54.175673 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:31:54.175686 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:31:54.175700 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:31:54.175712 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:31:54.175726 kernel: audit: type=2000 audit(1734100313.428:1): state=initialized audit_enabled=0 res=1 Dec 13 14:31:54.175743 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:31:54.175756 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:31:54.175770 kernel: cpuidle: using governor menu Dec 13 14:31:54.175785 kernel: ACPI: bus type PCI registered Dec 13 14:31:54.175800 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:31:54.175816 kernel: dca service started, version 1.12.1 Dec 13 14:31:54.175830 kernel: PCI: Using configuration type 1 for base access Dec 13 14:31:54.175846 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:31:54.175861 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:31:54.175879 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:31:54.175894 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:31:54.175909 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:31:54.176010 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:31:54.176025 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:31:54.176040 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:31:54.176055 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:31:54.176070 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:31:54.176085 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:31:54.176103 kernel: ACPI: Interpreter enabled Dec 13 14:31:54.176118 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:31:54.176133 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:31:54.176149 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:31:54.176164 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:31:54.176179 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:31:54.176430 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:31:54.176571 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:31:54.176596 kernel: acpiphp: Slot [3] registered Dec 13 14:31:54.176611 kernel: acpiphp: Slot [4] registered Dec 13 14:31:54.176626 kernel: acpiphp: Slot [5] registered Dec 13 14:31:54.176686 kernel: acpiphp: Slot [6] registered Dec 13 14:31:54.176699 kernel: acpiphp: Slot [7] registered Dec 13 14:31:54.176710 kernel: acpiphp: Slot [8] registered Dec 13 14:31:54.176721 kernel: acpiphp: Slot [9] registered Dec 13 14:31:54.176733 kernel: acpiphp: Slot [10] registered Dec 13 14:31:54.176745 kernel: acpiphp: Slot [11] registered Dec 13 14:31:54.176760 kernel: acpiphp: Slot [12] registered Dec 13 14:31:54.176773 kernel: acpiphp: Slot [13] registered Dec 13 14:31:54.176787 kernel: acpiphp: Slot [14] registered Dec 13 14:31:54.176801 kernel: acpiphp: Slot [15] registered Dec 13 14:31:54.176813 kernel: acpiphp: Slot [16] registered Dec 13 14:31:54.176825 kernel: acpiphp: Slot [17] registered Dec 13 14:31:54.176837 kernel: acpiphp: Slot [18] registered Dec 13 14:31:54.176850 kernel: acpiphp: Slot [19] registered Dec 13 14:31:54.176918 kernel: acpiphp: Slot [20] registered Dec 13 14:31:54.176941 kernel: acpiphp: Slot [21] registered Dec 13 14:31:54.176956 kernel: acpiphp: Slot [22] registered Dec 13 14:31:54.176970 kernel: acpiphp: Slot [23] registered Dec 13 14:31:54.176984 kernel: acpiphp: Slot [24] registered Dec 13 14:31:54.176999 kernel: acpiphp: Slot [25] registered Dec 13 14:31:54.177012 kernel: acpiphp: Slot [26] registered Dec 13 14:31:54.177027 kernel: acpiphp: Slot [27] registered Dec 13 14:31:54.177153 kernel: acpiphp: Slot [28] registered Dec 13 14:31:54.177167 kernel: acpiphp: Slot [29] registered Dec 13 14:31:54.177180 kernel: acpiphp: Slot [30] registered Dec 13 14:31:54.177198 kernel: acpiphp: Slot [31] registered Dec 13 14:31:54.177211 kernel: PCI host bridge to bus 0000:00 Dec 13 14:31:54.177387 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:31:54.177516 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:31:54.177658 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:31:54.177784 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:31:54.177905 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:31:54.178068 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:31:54.178218 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:31:54.178363 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 14:31:54.178501 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:31:54.178652 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 14:31:54.186264 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 14:31:54.186569 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 14:31:54.186736 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 14:31:54.186870 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 14:31:54.187131 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 14:31:54.187269 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 14:31:54.187411 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 14:31:54.187632 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 14:31:54.187785 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 14:31:54.187924 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:31:54.188064 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:31:54.188197 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 14:31:54.188342 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:31:54.188605 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 14:31:54.188623 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:31:54.188686 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:31:54.188700 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:31:54.188714 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:31:54.188728 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:31:54.188742 kernel: iommu: Default domain type: Translated Dec 13 14:31:54.188756 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:31:54.194566 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 14:31:54.194736 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:31:54.194862 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 14:31:54.194886 kernel: vgaarb: loaded Dec 13 14:31:54.194901 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:31:54.194916 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:31:54.194930 kernel: PTP clock support registered Dec 13 14:31:54.194945 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:31:54.194960 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:31:54.194974 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:31:54.195052 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 14:31:54.195077 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 14:31:54.195095 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 14:31:54.195109 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:31:54.195123 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:31:54.195137 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:31:54.195151 kernel: pnp: PnP ACPI init Dec 13 14:31:54.195165 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:31:54.195179 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:31:54.195193 kernel: NET: Registered PF_INET protocol family Dec 13 14:31:54.195209 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:31:54.195224 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:31:54.195238 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:31:54.195251 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:31:54.195265 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:31:54.195279 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:31:54.195293 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:31:54.195307 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:31:54.195321 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:31:54.195336 kernel: NET: Registered PF_XDP protocol family Dec 13 14:31:54.195457 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:31:54.195563 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:31:54.198833 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:31:54.199073 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:31:54.199205 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:31:54.199323 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:31:54.199346 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:31:54.199359 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:31:54.199372 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 14:31:54.199385 kernel: clocksource: Switched to clocksource tsc Dec 13 14:31:54.199399 kernel: Initialise system trusted keyrings Dec 13 14:31:54.199411 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:31:54.199423 kernel: Key type asymmetric registered Dec 13 14:31:54.199435 kernel: Asymmetric key parser 'x509' registered Dec 13 14:31:54.199448 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:31:54.199464 kernel: io scheduler mq-deadline registered Dec 13 14:31:54.199476 kernel: io scheduler kyber registered Dec 13 14:31:54.199489 kernel: io scheduler bfq registered Dec 13 14:31:54.199502 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:31:54.199514 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:31:54.199526 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:31:54.199539 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:31:54.199551 kernel: i8042: Warning: Keylock active Dec 13 14:31:54.199563 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:31:54.199575 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:31:54.199717 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:31:54.199834 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:31:54.199943 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:31:53 UTC (1734100313) Dec 13 14:31:54.200047 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:31:54.200063 kernel: intel_pstate: CPU model not supported Dec 13 14:31:54.200077 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:31:54.200091 kernel: Segment Routing with IPv6 Dec 13 14:31:54.200108 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:31:54.200122 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:31:54.200136 kernel: Key type dns_resolver registered Dec 13 14:31:54.200149 kernel: IPI shorthand broadcast: enabled Dec 13 14:31:54.200163 kernel: sched_clock: Marking stable (425078934, 248000929)->(865948583, -192868720) Dec 13 14:31:54.200177 kernel: registered taskstats version 1 Dec 13 14:31:54.200191 kernel: Loading compiled-in X.509 certificates Dec 13 14:31:54.200205 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:31:54.200219 kernel: Key type .fscrypt registered Dec 13 14:31:54.200235 kernel: Key type fscrypt-provisioning registered Dec 13 14:31:54.200249 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:31:54.200263 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:31:54.200277 kernel: ima: No architecture policies found Dec 13 14:31:54.200291 kernel: clk: Disabling unused clocks Dec 13 14:31:54.200305 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:31:54.200318 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:31:54.200333 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:31:54.200346 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:31:54.200363 kernel: Run /init as init process Dec 13 14:31:54.200376 kernel: with arguments: Dec 13 14:31:54.200390 kernel: /init Dec 13 14:31:54.200404 kernel: with environment: Dec 13 14:31:54.200417 kernel: HOME=/ Dec 13 14:31:54.200430 kernel: TERM=linux Dec 13 14:31:54.200443 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:31:54.200460 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:31:54.200480 systemd[1]: Detected virtualization amazon. Dec 13 14:31:54.200495 systemd[1]: Detected architecture x86-64. Dec 13 14:31:54.200509 systemd[1]: Running in initrd. Dec 13 14:31:54.200523 systemd[1]: No hostname configured, using default hostname. Dec 13 14:31:54.200552 systemd[1]: Hostname set to . Dec 13 14:31:54.200570 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:31:54.200588 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:31:54.200602 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:31:54.200617 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:31:54.200632 systemd[1]: Reached target cryptsetup.target. Dec 13 14:31:54.200657 systemd[1]: Reached target paths.target. Dec 13 14:31:54.200671 systemd[1]: Reached target slices.target. Dec 13 14:31:54.200686 systemd[1]: Reached target swap.target. Dec 13 14:31:54.200701 systemd[1]: Reached target timers.target. Dec 13 14:31:54.200719 systemd[1]: Listening on iscsid.socket. Dec 13 14:31:54.200733 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:31:54.200757 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:31:54.200775 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:31:54.200791 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:31:54.200807 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:31:54.200823 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:31:54.200839 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:31:54.200858 systemd[1]: Reached target sockets.target. Dec 13 14:31:54.200874 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:31:54.200894 systemd[1]: Finished network-cleanup.service. Dec 13 14:31:54.200910 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:31:54.200925 systemd[1]: Starting systemd-journald.service... Dec 13 14:31:54.200941 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:31:54.200957 systemd[1]: Starting systemd-resolved.service... Dec 13 14:31:54.200973 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:31:54.200985 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:31:54.201008 systemd-journald[185]: Journal started Dec 13 14:31:54.201087 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2a368459d660550abefa4d59a9ebca) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:31:54.192216 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:31:54.438199 kernel: audit: type=1130 audit(1734100314.199:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.438246 systemd[1]: Started systemd-journald.service. Dec 13 14:31:54.438271 kernel: audit: type=1130 audit(1734100314.207:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.438288 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:31:54.438305 kernel: Bridge firewalling registered Dec 13 14:31:54.438394 kernel: SCSI subsystem initialized Dec 13 14:31:54.438424 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:31:54.438444 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:31:54.438462 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:31:54.438483 kernel: audit: type=1130 audit(1734100314.430:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.209075 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:31:54.453492 kernel: audit: type=1130 audit(1734100314.434:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.453519 kernel: audit: type=1130 audit(1734100314.436:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.453532 kernel: audit: type=1130 audit(1734100314.439:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.249196 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:31:54.264487 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:31:54.264502 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:31:54.264555 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:31:54.277239 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:31:54.300423 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:31:54.432039 systemd[1]: Started systemd-resolved.service. Dec 13 14:31:54.436360 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:31:54.438519 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:31:54.440537 systemd[1]: Reached target nss-lookup.target. Dec 13 14:31:54.453753 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:31:54.455598 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:31:54.466712 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:31:54.504727 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:31:54.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.508648 kernel: audit: type=1130 audit(1734100314.503:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.510496 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:31:54.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.514654 kernel: audit: type=1130 audit(1734100314.508:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.518367 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:31:54.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.522259 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:31:54.526198 kernel: audit: type=1130 audit(1734100314.520:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.551288 dracut-cmdline[207]: dracut-dracut-053 Dec 13 14:31:54.559601 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:31:54.768678 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:31:54.820946 kernel: iscsi: registered transport (tcp) Dec 13 14:31:54.886039 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:31:54.886142 kernel: QLogic iSCSI HBA Driver Dec 13 14:31:54.939721 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:31:54.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.942937 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:31:55.009674 kernel: raid6: avx512x4 gen() 10173 MB/s Dec 13 14:31:55.026704 kernel: raid6: avx512x4 xor() 4433 MB/s Dec 13 14:31:55.044739 kernel: raid6: avx512x2 gen() 10086 MB/s Dec 13 14:31:55.062683 kernel: raid6: avx512x2 xor() 17031 MB/s Dec 13 14:31:55.079692 kernel: raid6: avx512x1 gen() 13023 MB/s Dec 13 14:31:55.097763 kernel: raid6: avx512x1 xor() 17846 MB/s Dec 13 14:31:55.114687 kernel: raid6: avx2x4 gen() 12883 MB/s Dec 13 14:31:55.133697 kernel: raid6: avx2x4 xor() 4576 MB/s Dec 13 14:31:55.150693 kernel: raid6: avx2x2 gen() 13702 MB/s Dec 13 14:31:55.167695 kernel: raid6: avx2x2 xor() 13970 MB/s Dec 13 14:31:55.184680 kernel: raid6: avx2x1 gen() 10784 MB/s Dec 13 14:31:55.201694 kernel: raid6: avx2x1 xor() 10231 MB/s Dec 13 14:31:55.218692 kernel: raid6: sse2x4 gen() 7425 MB/s Dec 13 14:31:55.236767 kernel: raid6: sse2x4 xor() 4979 MB/s Dec 13 14:31:55.254693 kernel: raid6: sse2x2 gen() 8425 MB/s Dec 13 14:31:55.271712 kernel: raid6: sse2x2 xor() 3980 MB/s Dec 13 14:31:55.289685 kernel: raid6: sse2x1 gen() 8436 MB/s Dec 13 14:31:55.308225 kernel: raid6: sse2x1 xor() 2693 MB/s Dec 13 14:31:55.308300 kernel: raid6: using algorithm avx2x2 gen() 13702 MB/s Dec 13 14:31:55.308318 kernel: raid6: .... xor() 13970 MB/s, rmw enabled Dec 13 14:31:55.309005 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:31:55.326671 kernel: xor: automatically using best checksumming function avx Dec 13 14:31:55.488669 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:31:55.498840 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:31:55.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.501000 audit: BPF prog-id=7 op=LOAD Dec 13 14:31:55.502000 audit: BPF prog-id=8 op=LOAD Dec 13 14:31:55.504505 systemd[1]: Starting systemd-udevd.service... Dec 13 14:31:55.524631 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 14:31:55.542700 systemd[1]: Started systemd-udevd.service. Dec 13 14:31:55.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.550512 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:31:55.579065 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Dec 13 14:31:55.627472 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:31:55.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.630431 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:31:55.724972 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:31:55.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.827145 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:31:55.856370 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:31:55.856493 kernel: AES CTR mode by8 optimization enabled Dec 13 14:31:55.856520 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:31:55.856733 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:31:55.856877 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 14:31:55.857021 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:03:5d:07:a2:c7 Dec 13 14:31:55.857033 (udev-worker)[439]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:31:56.037299 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:31:56.037536 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:31:56.037563 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:31:56.037713 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:31:56.037729 kernel: GPT:9289727 != 16777215 Dec 13 14:31:56.037745 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:31:56.037761 kernel: GPT:9289727 != 16777215 Dec 13 14:31:56.037778 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:31:56.037795 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:31:56.037814 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (441) Dec 13 14:31:56.055993 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:31:56.068482 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:31:56.102582 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:31:56.111750 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:31:56.113197 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:31:56.125466 systemd[1]: Starting disk-uuid.service... Dec 13 14:31:56.134993 disk-uuid[593]: Primary Header is updated. Dec 13 14:31:56.134993 disk-uuid[593]: Secondary Entries is updated. Dec 13 14:31:56.134993 disk-uuid[593]: Secondary Header is updated. Dec 13 14:31:56.141664 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:31:56.147675 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:31:56.153671 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:31:57.161388 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:31:57.163934 disk-uuid[594]: The operation has completed successfully. Dec 13 14:31:57.376324 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:31:57.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:57.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:57.376453 systemd[1]: Finished disk-uuid.service. Dec 13 14:31:57.387908 systemd[1]: Starting verity-setup.service... Dec 13 14:31:57.410660 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:31:57.567776 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:31:57.573599 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:31:57.580029 systemd[1]: Finished verity-setup.service. Dec 13 14:31:57.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:57.763661 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:31:57.764183 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:31:57.764468 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:31:57.765576 systemd[1]: Starting ignition-setup.service... Dec 13 14:31:57.772037 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:31:57.803348 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:57.803426 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:31:57.803444 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:31:57.835723 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:31:57.853845 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:31:57.886668 systemd[1]: Finished ignition-setup.service. Dec 13 14:31:57.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:57.888966 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:31:57.936015 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:31:57.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:57.940000 audit: BPF prog-id=9 op=LOAD Dec 13 14:31:57.943493 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:57.991549 systemd-networkd[1105]: lo: Link UP Dec 13 14:31:57.993689 systemd-networkd[1105]: lo: Gained carrier Dec 13 14:31:57.997463 systemd-networkd[1105]: Enumeration completed Dec 13 14:31:57.999465 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:58.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.001498 systemd[1]: Reached target network.target. Dec 13 14:31:58.003664 systemd[1]: Starting iscsiuio.service... Dec 13 14:31:58.010831 systemd-networkd[1105]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:58.015556 systemd[1]: Started iscsiuio.service. Dec 13 14:31:58.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.017918 systemd-networkd[1105]: eth0: Link UP Dec 13 14:31:58.017925 systemd-networkd[1105]: eth0: Gained carrier Dec 13 14:31:58.018245 systemd[1]: Starting iscsid.service... Dec 13 14:31:58.034138 iscsid[1110]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:31:58.034138 iscsid[1110]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:31:58.034138 iscsid[1110]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:31:58.034138 iscsid[1110]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:31:58.034138 iscsid[1110]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:31:58.034138 iscsid[1110]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:31:58.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.034246 systemd[1]: Started iscsid.service. Dec 13 14:31:58.036911 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:31:58.048774 systemd-networkd[1105]: eth0: DHCPv4 address 172.31.21.211/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:31:58.091243 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:31:58.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.095258 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:31:58.096545 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:31:58.098068 systemd[1]: Reached target remote-fs.target. Dec 13 14:31:58.101515 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:31:58.146604 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:31:58.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.292222 ignition[1095]: Ignition 2.14.0 Dec 13 14:31:58.292236 ignition[1095]: Stage: fetch-offline Dec 13 14:31:58.292384 ignition[1095]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:58.292426 ignition[1095]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:31:58.324341 ignition[1095]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:31:58.324707 ignition[1095]: Ignition finished successfully Dec 13 14:31:58.326534 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:31:58.339019 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:31:58.339059 kernel: audit: type=1130 audit(1734100318.326:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.339004 systemd[1]: Starting ignition-fetch.service... Dec 13 14:31:58.369663 ignition[1129]: Ignition 2.14.0 Dec 13 14:31:58.370819 ignition[1129]: Stage: fetch Dec 13 14:31:58.371063 ignition[1129]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:58.371108 ignition[1129]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:31:58.390770 ignition[1129]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:31:58.392139 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:31:58.427576 ignition[1129]: INFO : PUT result: OK Dec 13 14:31:58.430377 ignition[1129]: DEBUG : parsed url from cmdline: "" Dec 13 14:31:58.430377 ignition[1129]: INFO : no config URL provided Dec 13 14:31:58.430377 ignition[1129]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:31:58.441008 ignition[1129]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:31:58.441008 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:31:58.441008 ignition[1129]: INFO : PUT result: OK Dec 13 14:31:58.441008 ignition[1129]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:31:58.457328 ignition[1129]: INFO : GET result: OK Dec 13 14:31:58.457328 ignition[1129]: DEBUG : parsing config with SHA512: 3e157fd51d3628c99bca38270dd9676dbe81da29d215249036bc907263ebd5df7534c19f87f82caa6e98f23f883ee78c2556e9092a54af9d441961e6d129ff91 Dec 13 14:31:58.471671 unknown[1129]: fetched base config from "system" Dec 13 14:31:58.471689 unknown[1129]: fetched base config from "system" Dec 13 14:31:58.474308 ignition[1129]: fetch: fetch complete Dec 13 14:31:58.471698 unknown[1129]: fetched user config from "aws" Dec 13 14:31:58.474319 ignition[1129]: fetch: fetch passed Dec 13 14:31:58.474402 ignition[1129]: Ignition finished successfully Dec 13 14:31:58.480821 systemd[1]: Finished ignition-fetch.service. Dec 13 14:31:58.483583 systemd[1]: Starting ignition-kargs.service... Dec 13 14:31:58.490594 kernel: audit: type=1130 audit(1734100318.480:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.503350 ignition[1135]: Ignition 2.14.0 Dec 13 14:31:58.503364 ignition[1135]: Stage: kargs Dec 13 14:31:58.503569 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:58.503601 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:31:58.515732 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:31:58.521392 ignition[1135]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:31:58.521392 ignition[1135]: INFO : PUT result: OK Dec 13 14:31:58.530328 ignition[1135]: kargs: kargs passed Dec 13 14:31:58.531933 ignition[1135]: Ignition finished successfully Dec 13 14:31:58.540438 systemd[1]: Finished ignition-kargs.service. Dec 13 14:31:58.541671 systemd[1]: Starting ignition-disks.service... Dec 13 14:31:58.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.551178 kernel: audit: type=1130 audit(1734100318.539:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.555755 ignition[1141]: Ignition 2.14.0 Dec 13 14:31:58.555768 ignition[1141]: Stage: disks Dec 13 14:31:58.555973 ignition[1141]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:58.556009 ignition[1141]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:31:58.564986 ignition[1141]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:31:58.566438 ignition[1141]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:31:58.571047 ignition[1141]: INFO : PUT result: OK Dec 13 14:31:58.578238 ignition[1141]: disks: disks passed Dec 13 14:31:58.578296 ignition[1141]: Ignition finished successfully Dec 13 14:31:58.581255 systemd[1]: Finished ignition-disks.service. Dec 13 14:31:58.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.582363 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:31:58.591244 kernel: audit: type=1130 audit(1734100318.580:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.588882 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:31:58.592252 systemd[1]: Reached target local-fs.target. Dec 13 14:31:58.593333 systemd[1]: Reached target sysinit.target. Dec 13 14:31:58.599776 systemd[1]: Reached target basic.target. Dec 13 14:31:58.603126 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:31:58.632224 systemd-fsck[1149]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:31:58.639442 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:31:58.647420 kernel: audit: type=1130 audit(1734100318.639:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.641628 systemd[1]: Mounting sysroot.mount... Dec 13 14:31:58.674656 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:31:58.676379 systemd[1]: Mounted sysroot.mount. Dec 13 14:31:58.690730 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:31:58.696904 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:31:58.699701 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:31:58.699929 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:31:58.699966 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:31:58.708874 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:31:58.715291 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:31:58.718277 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:31:58.727335 initrd-setup-root[1171]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:31:58.741449 initrd-setup-root[1179]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:31:58.751660 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1166) Dec 13 14:31:58.754110 initrd-setup-root[1187]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:31:58.759788 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:58.759822 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:31:58.759847 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:31:58.764302 initrd-setup-root[1211]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:31:58.775737 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:31:58.781448 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:31:58.910692 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:31:58.929481 kernel: audit: type=1130 audit(1734100318.913:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:58.916048 systemd[1]: Starting ignition-mount.service... Dec 13 14:31:58.929779 systemd[1]: Starting sysroot-boot.service... Dec 13 14:31:58.958065 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:58.958208 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:58.980239 ignition[1232]: INFO : Ignition 2.14.0 Dec 13 14:31:58.981529 ignition[1232]: INFO : Stage: mount Dec 13 14:31:58.981529 ignition[1232]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:58.981529 ignition[1232]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:31:58.993290 systemd[1]: Finished sysroot-boot.service. Dec 13 14:31:58.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:59.000552 ignition[1232]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:31:59.002340 kernel: audit: type=1130 audit(1734100318.994:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:59.002410 ignition[1232]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:31:59.004940 ignition[1232]: INFO : PUT result: OK Dec 13 14:31:59.009001 ignition[1232]: INFO : mount: mount passed Dec 13 14:31:59.010620 ignition[1232]: INFO : Ignition finished successfully Dec 13 14:31:59.012630 systemd[1]: Finished ignition-mount.service. Dec 13 14:31:59.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:59.016185 systemd[1]: Starting ignition-files.service... Dec 13 14:31:59.024804 kernel: audit: type=1130 audit(1734100319.013:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:59.029197 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:31:59.043670 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1241) Dec 13 14:31:59.048166 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:59.048322 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:31:59.048345 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:31:59.054664 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:31:59.058535 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:31:59.075375 ignition[1260]: INFO : Ignition 2.14.0 Dec 13 14:31:59.075375 ignition[1260]: INFO : Stage: files Dec 13 14:31:59.077413 ignition[1260]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:59.077413 ignition[1260]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:31:59.090976 ignition[1260]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:31:59.093183 ignition[1260]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:31:59.095296 ignition[1260]: INFO : PUT result: OK Dec 13 14:31:59.099493 ignition[1260]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:31:59.118799 ignition[1260]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:31:59.120845 ignition[1260]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:31:59.132877 ignition[1260]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:31:59.138269 ignition[1260]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:31:59.148806 unknown[1260]: wrote ssh authorized keys file for user: core Dec 13 14:31:59.155303 ignition[1260]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:31:59.172224 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 14:31:59.174910 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 14:31:59.174910 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:31:59.174910 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:31:59.186240 ignition[1260]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2251024247" Dec 13 14:31:59.190168 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1260) Dec 13 14:31:59.190250 ignition[1260]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2251024247": device or resource busy Dec 13 14:31:59.190250 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2251024247", trying btrfs: device or resource busy Dec 13 14:31:59.190250 ignition[1260]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2251024247" Dec 13 14:31:59.196359 ignition[1260]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2251024247" Dec 13 14:31:59.200521 ignition[1260]: INFO : op(3): [started] unmounting "/mnt/oem2251024247" Dec 13 14:31:59.201808 ignition[1260]: INFO : op(3): [finished] unmounting "/mnt/oem2251024247" Dec 13 14:31:59.201808 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:31:59.201808 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:31:59.201808 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:31:59.211958 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:31:59.211958 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:31:59.211958 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:59.211958 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:59.211958 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:31:59.211958 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:31:59.228452 ignition[1260]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318380694" Dec 13 14:31:59.228452 ignition[1260]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318380694": device or resource busy Dec 13 14:31:59.228452 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3318380694", trying btrfs: device or resource busy Dec 13 14:31:59.228452 ignition[1260]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318380694" Dec 13 14:31:59.237787 ignition[1260]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3318380694" Dec 13 14:31:59.237787 ignition[1260]: INFO : op(6): [started] unmounting "/mnt/oem3318380694" Dec 13 14:31:59.237787 ignition[1260]: INFO : op(6): [finished] unmounting "/mnt/oem3318380694" Dec 13 14:31:59.237787 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:31:59.237787 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:31:59.237787 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:31:59.241800 systemd-networkd[1105]: eth0: Gained IPv6LL Dec 13 14:31:59.253826 ignition[1260]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3804507869" Dec 13 14:31:59.255835 ignition[1260]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3804507869": device or resource busy Dec 13 14:31:59.255835 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3804507869", trying btrfs: device or resource busy Dec 13 14:31:59.255835 ignition[1260]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3804507869" Dec 13 14:31:59.264189 ignition[1260]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3804507869" Dec 13 14:31:59.264189 ignition[1260]: INFO : op(9): [started] unmounting "/mnt/oem3804507869" Dec 13 14:31:59.264189 ignition[1260]: INFO : op(9): [finished] unmounting "/mnt/oem3804507869" Dec 13 14:31:59.264189 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:31:59.264189 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:31:59.264189 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:31:59.311377 ignition[1260]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830993548" Dec 13 14:31:59.332339 ignition[1260]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830993548": device or resource busy Dec 13 14:31:59.332339 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3830993548", trying btrfs: device or resource busy Dec 13 14:31:59.332339 ignition[1260]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830993548" Dec 13 14:31:59.332339 ignition[1260]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830993548" Dec 13 14:31:59.388926 ignition[1260]: INFO : op(c): [started] unmounting "/mnt/oem3830993548" Dec 13 14:31:59.388926 ignition[1260]: INFO : op(c): [finished] unmounting "/mnt/oem3830993548" Dec 13 14:31:59.388926 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:31:59.388926 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:59.388926 ignition[1260]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:32:00.118733 ignition[1260]: INFO : GET result: OK Dec 13 14:32:00.632327 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:32:00.632327 ignition[1260]: INFO : files: op(c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:32:00.632327 ignition[1260]: INFO : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:32:00.632327 ignition[1260]: INFO : files: op(d): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(d): op(e): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(d): op(e): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(d): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(f): [started] processing unit "nvidia.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(f): [finished] processing unit "nvidia.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(10): [started] processing unit "containerd.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(10): op(11): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(10): op(11): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(10): [finished] processing unit "containerd.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(13): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(13): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(14): [started] setting preset to enabled for "nvidia.service" Dec 13 14:32:00.647857 ignition[1260]: INFO : files: op(14): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:32:00.708209 kernel: audit: type=1130 audit(1734100320.670:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.662808 systemd[1]: Finished ignition-files.service. Dec 13 14:32:00.712246 ignition[1260]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:00.712246 ignition[1260]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:00.712246 ignition[1260]: INFO : files: files passed Dec 13 14:32:00.712246 ignition[1260]: INFO : Ignition finished successfully Dec 13 14:32:00.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.683515 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:32:00.753272 kernel: audit: type=1130 audit(1734100320.734:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.701103 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:32:00.771679 initrd-setup-root-after-ignition[1285]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:32:00.708911 systemd[1]: Starting ignition-quench.service... Dec 13 14:32:00.731122 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:32:00.736649 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:32:00.736768 systemd[1]: Finished ignition-quench.service. Dec 13 14:32:00.749588 systemd[1]: Reached target ignition-complete.target. Dec 13 14:32:00.761710 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:32:00.874196 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:32:00.876124 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:32:00.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.884136 systemd[1]: Reached target initrd-fs.target. Dec 13 14:32:00.893539 systemd[1]: Reached target initrd.target. Dec 13 14:32:00.901890 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:32:00.909650 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:32:00.976094 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:32:00.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.984680 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:32:01.060878 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:32:01.069518 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:32:01.081164 systemd[1]: Stopped target timers.target. Dec 13 14:32:01.086879 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:32:01.091216 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:32:01.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.096416 systemd[1]: Stopped target initrd.target. Dec 13 14:32:01.099188 systemd[1]: Stopped target basic.target. Dec 13 14:32:01.101619 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:32:01.105271 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:32:01.110119 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:32:01.112566 systemd[1]: Stopped target remote-fs.target. Dec 13 14:32:01.115244 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:32:01.118420 systemd[1]: Stopped target sysinit.target. Dec 13 14:32:01.125123 systemd[1]: Stopped target local-fs.target. Dec 13 14:32:01.127483 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:32:01.130021 systemd[1]: Stopped target swap.target. Dec 13 14:32:01.132965 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:32:01.134869 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:32:01.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.138553 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:32:01.143729 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:32:01.145438 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:32:01.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.148124 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:32:01.151700 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:32:01.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.154691 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:32:01.156848 systemd[1]: Stopped ignition-files.service. Dec 13 14:32:01.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.166395 systemd[1]: Stopping ignition-mount.service... Dec 13 14:32:01.175385 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:32:01.177752 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:32:01.179424 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:32:01.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.203692 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:32:01.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.240020 ignition[1299]: INFO : Ignition 2.14.0 Dec 13 14:32:01.240020 ignition[1299]: INFO : Stage: umount Dec 13 14:32:01.240020 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:01.240020 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:01.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.204448 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:32:01.262309 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:01.262309 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:01.262309 ignition[1299]: INFO : PUT result: OK Dec 13 14:32:01.228962 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:32:01.229095 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:32:01.245854 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:32:01.304474 ignition[1299]: INFO : umount: umount passed Dec 13 14:32:01.305765 ignition[1299]: INFO : Ignition finished successfully Dec 13 14:32:01.310871 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:32:01.311368 systemd[1]: Stopped ignition-mount.service. Dec 13 14:32:01.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.316567 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:32:01.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.316693 systemd[1]: Stopped ignition-disks.service. Dec 13 14:32:01.320793 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:32:01.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.321054 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:32:01.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.326273 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:32:01.326355 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:32:01.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.334875 systemd[1]: Stopped target network.target. Dec 13 14:32:01.337823 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:32:01.339276 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:32:01.341311 systemd[1]: Stopped target paths.target. Dec 13 14:32:01.343141 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:32:01.349309 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:32:01.353345 systemd[1]: Stopped target slices.target. Dec 13 14:32:01.359190 systemd[1]: Stopped target sockets.target. Dec 13 14:32:01.363752 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:32:01.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.363809 systemd[1]: Closed iscsid.socket. Dec 13 14:32:01.371019 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:32:01.371064 systemd[1]: Closed iscsiuio.socket. Dec 13 14:32:01.373937 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:32:01.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.374035 systemd[1]: Stopped ignition-setup.service. Dec 13 14:32:01.384417 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:32:01.392008 systemd-networkd[1105]: eth0: DHCPv6 lease lost Dec 13 14:32:01.420000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:32:01.394139 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:32:01.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.400199 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:32:01.400333 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:32:01.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.405081 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:32:01.405274 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:32:01.419362 systemd[1]: Stopping network-cleanup.service... Dec 13 14:32:01.420827 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:32:01.421036 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:32:01.438433 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:32:01.438504 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:32:01.448323 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:32:01.449428 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:32:01.479996 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:32:01.521184 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:32:01.527561 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:32:01.527723 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:32:01.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.543869 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:32:01.544294 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:32:01.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.569000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:32:01.565048 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:32:01.565221 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:32:01.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.571394 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:32:01.571465 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:32:01.574275 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:32:01.574334 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:32:01.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.577017 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:32:01.579821 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:32:01.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.589284 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:32:01.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.589442 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:32:01.611482 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:32:01.612241 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:32:01.642458 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:32:01.642543 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:32:01.684931 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:32:01.702036 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:32:01.718943 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:32:01.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.735521 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:32:01.736985 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:32:01.751456 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:32:01.759483 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:32:01.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.777341 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:32:01.797842 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:32:01.800081 systemd[1]: Stopped network-cleanup.service. Dec 13 14:32:01.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.810883 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:32:01.811023 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:32:01.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:01.826588 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:32:01.832685 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:32:01.863477 systemd[1]: Switching root. Dec 13 14:32:01.872000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:32:01.872000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:32:01.872000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:32:01.880000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:32:01.880000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:32:01.915452 iscsid[1110]: iscsid shutting down. Dec 13 14:32:01.925578 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 13 14:32:01.925713 systemd-journald[185]: Journal stopped Dec 13 14:32:07.623306 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:32:07.623372 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:32:07.623391 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:32:07.623414 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:32:07.623431 kernel: SELinux: policy capability open_perms=1 Dec 13 14:32:07.623458 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:32:07.623478 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:32:07.623494 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:32:07.623511 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:32:07.623535 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:32:07.623552 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:32:07.623570 systemd[1]: Successfully loaded SELinux policy in 98.450ms. Dec 13 14:32:07.623608 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.178ms. Dec 13 14:32:07.623732 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:32:07.623754 systemd[1]: Detected virtualization amazon. Dec 13 14:32:07.623777 systemd[1]: Detected architecture x86-64. Dec 13 14:32:07.623796 systemd[1]: Detected first boot. Dec 13 14:32:07.623900 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:32:07.623924 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:32:07.623943 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:32:07.623963 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:07.623982 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:07.624006 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:07.624026 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:32:07.624045 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:32:07.624063 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:32:07.624082 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:32:07.624101 systemd[1]: Created slice system-getty.slice. Dec 13 14:32:07.624119 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:32:07.624138 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:32:07.624160 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:32:07.624178 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:32:07.624209 systemd[1]: Created slice user.slice. Dec 13 14:32:07.624228 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:32:07.624249 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:32:07.624270 systemd[1]: Set up automount boot.automount. Dec 13 14:32:07.624292 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:32:07.624313 systemd[1]: Reached target integritysetup.target. Dec 13 14:32:07.624411 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:32:07.624439 systemd[1]: Reached target remote-fs.target. Dec 13 14:32:07.624460 systemd[1]: Reached target slices.target. Dec 13 14:32:07.624482 systemd[1]: Reached target swap.target. Dec 13 14:32:07.624503 systemd[1]: Reached target torcx.target. Dec 13 14:32:07.624523 systemd[1]: Reached target veritysetup.target. Dec 13 14:32:07.624546 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:32:07.624566 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:32:07.624582 kernel: kauditd_printk_skb: 55 callbacks suppressed Dec 13 14:32:07.624604 kernel: audit: type=1400 audit(1734100327.316:87): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:07.624621 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:32:07.624663 kernel: audit: type=1335 audit(1734100327.316:88): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 14:32:07.624680 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:32:07.624706 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:32:07.624724 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:32:07.624740 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:32:07.624755 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:32:07.624781 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:32:07.624799 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:32:07.624818 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:32:07.624838 systemd[1]: Mounting media.mount... Dec 13 14:32:07.624857 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:07.624878 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:32:07.624899 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:32:07.624917 systemd[1]: Mounting tmp.mount... Dec 13 14:32:07.624936 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:32:07.624957 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:07.624977 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:32:07.624995 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:32:07.625013 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:07.625032 systemd[1]: Starting modprobe@drm.service... Dec 13 14:32:07.625050 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:07.625069 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:32:07.625087 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:07.625107 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:32:07.625129 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 14:32:07.625148 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 14:32:07.625166 systemd[1]: Starting systemd-journald.service... Dec 13 14:32:07.625185 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:32:07.625204 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:32:07.625223 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:32:07.625242 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:32:07.625261 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:07.625280 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:32:07.625302 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:32:07.625323 systemd[1]: Mounted media.mount. Dec 13 14:32:07.625342 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:32:07.625361 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:32:07.625381 systemd[1]: Mounted tmp.mount. Dec 13 14:32:07.625401 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:32:07.625420 kernel: audit: type=1130 audit(1734100327.608:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.625440 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:32:07.625462 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:32:07.625480 kernel: fuse: init (API version 7.34) Dec 13 14:32:07.625500 kernel: audit: type=1305 audit(1734100327.620:90): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:32:07.625519 kernel: audit: type=1300 audit(1734100327.620:90): arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc75d0f480 a2=4000 a3=7ffc75d0f51c items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:07.625538 kernel: audit: type=1327 audit(1734100327.620:90): proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:32:07.625564 systemd-journald[1447]: Journal started Dec 13 14:32:07.625725 systemd-journald[1447]: Runtime Journal (/run/log/journal/ec2a368459d660550abefa4d59a9ebca) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:32:07.316000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 14:32:07.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.620000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:32:07.620000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc75d0f480 a2=4000 a3=7ffc75d0f51c items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:07.620000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:32:07.635667 kernel: loop: module loaded Dec 13 14:32:07.654182 kernel: audit: type=1130 audit(1734100327.642:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.654258 kernel: audit: type=1131 audit(1734100327.646:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.654280 systemd[1]: Started systemd-journald.service. Dec 13 14:32:07.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.662480 kernel: audit: type=1130 audit(1734100327.654:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.657889 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:07.667169 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:07.668833 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:32:07.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.673651 kernel: audit: type=1130 audit(1734100327.667:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.674663 systemd[1]: Finished modprobe@drm.service. Dec 13 14:32:07.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.678390 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:07.678658 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:07.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.680403 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:32:07.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.680805 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:32:07.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.682502 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:07.682794 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:07.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.684420 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:32:07.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.686025 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:32:07.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.687429 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:32:07.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.689098 systemd[1]: Reached target network-pre.target. Dec 13 14:32:07.692663 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:32:07.695199 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:32:07.700291 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:32:07.706378 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:32:07.710550 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:32:07.715863 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:07.719149 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:32:07.723946 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:07.737707 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:32:07.745973 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:32:07.760058 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:32:07.777022 systemd-journald[1447]: Time spent on flushing to /var/log/journal/ec2a368459d660550abefa4d59a9ebca is 145.016ms for 1107 entries. Dec 13 14:32:07.777022 systemd-journald[1447]: System Journal (/var/log/journal/ec2a368459d660550abefa4d59a9ebca) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:32:07.935084 systemd-journald[1447]: Received client request to flush runtime journal. Dec 13 14:32:07.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.791316 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:32:07.792993 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:32:07.821769 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:32:07.894221 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:32:07.900665 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:32:07.936801 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:32:07.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.962119 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:32:07.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.965584 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:32:07.991085 udevadm[1501]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:32:07.997246 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:32:07.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.999620 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:32:08.055390 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:32:08.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.791064 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:32:08.796219 systemd[1]: Starting systemd-udevd.service... Dec 13 14:32:08.859152 systemd-udevd[1507]: Using default interface naming scheme 'v252'. Dec 13 14:32:08.940751 systemd[1]: Started systemd-udevd.service. Dec 13 14:32:08.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.950080 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:08.976333 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:32:09.053900 systemd[1]: Started systemd-userdbd.service. Dec 13 14:32:09.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:09.088273 systemd[1]: Found device dev-ttyS0.device. Dec 13 14:32:09.112429 (udev-worker)[1523]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:32:09.236657 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:32:09.244082 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:32:09.244174 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:32:09.268657 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:32:09.271251 systemd-networkd[1513]: lo: Link UP Dec 13 14:32:09.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:09.271263 systemd-networkd[1513]: lo: Gained carrier Dec 13 14:32:09.271927 systemd-networkd[1513]: Enumeration completed Dec 13 14:32:09.272100 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:09.275817 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:32:09.278390 systemd-networkd[1513]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:09.284417 systemd-networkd[1513]: eth0: Link UP Dec 13 14:32:09.284680 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:09.284958 systemd-networkd[1513]: eth0: Gained carrier Dec 13 14:32:09.296926 systemd-networkd[1513]: eth0: DHCPv4 address 172.31.21.211/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:32:09.262000 audit[1511]: AVC avc: denied { confidentiality } for pid=1511 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:32:09.262000 audit[1511]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d0f7902850 a1=337fc a2=7f84c267cbc5 a3=5 items=110 ppid=1507 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:09.262000 audit: CWD cwd="/" Dec 13 14:32:09.262000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=1 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=2 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=3 name=(null) inode=14189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=4 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=5 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=6 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=7 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=8 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=9 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=10 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=11 name=(null) inode=14193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=12 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=13 name=(null) inode=14194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=14 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=15 name=(null) inode=14195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=16 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=17 name=(null) inode=14196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=18 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=19 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=20 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=21 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=22 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=23 name=(null) inode=14199 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=24 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=25 name=(null) inode=14200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=26 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=27 name=(null) inode=14201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=28 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=29 name=(null) inode=14202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=30 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=31 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=32 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=33 name=(null) inode=14204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=34 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=35 name=(null) inode=14205 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=36 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=37 name=(null) inode=14206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=38 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=39 name=(null) inode=14207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=40 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=41 name=(null) inode=14208 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=42 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=43 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=44 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=45 name=(null) inode=14210 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=46 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=47 name=(null) inode=14211 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=48 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=49 name=(null) inode=14212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=50 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=51 name=(null) inode=14213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=52 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=53 name=(null) inode=14214 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=55 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=56 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=57 name=(null) inode=14216 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=58 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=59 name=(null) inode=14217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=60 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=61 name=(null) inode=14218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=62 name=(null) inode=14218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=63 name=(null) inode=14219 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=64 name=(null) inode=14218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=65 name=(null) inode=14220 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=66 name=(null) inode=14218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=67 name=(null) inode=14221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=68 name=(null) inode=14218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=69 name=(null) inode=14222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=70 name=(null) inode=14218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=71 name=(null) inode=14223 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=72 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=73 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=74 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=75 name=(null) inode=14225 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=76 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=77 name=(null) inode=14226 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=78 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=79 name=(null) inode=14227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=80 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=81 name=(null) inode=14228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=82 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=83 name=(null) inode=14229 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=84 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=85 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=86 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=87 name=(null) inode=14231 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=88 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=89 name=(null) inode=14232 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=90 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=91 name=(null) inode=14233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=92 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=93 name=(null) inode=14234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=94 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=95 name=(null) inode=14235 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=96 name=(null) inode=14215 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=97 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=98 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=99 name=(null) inode=14237 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=100 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=101 name=(null) inode=14238 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=102 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=103 name=(null) inode=14239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=104 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=105 name=(null) inode=14240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=106 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=107 name=(null) inode=14241 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PATH item=109 name=(null) inode=14859 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:09.262000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:32:09.405742 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:32:09.427689 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:32:09.434498 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 14:32:09.525662 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1522) Dec 13 14:32:09.734158 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Dec 13 14:32:09.785207 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:32:09.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:09.791048 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:32:09.850464 lvm[1622]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:32:09.901360 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:32:09.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:09.902838 systemd[1]: Reached target cryptsetup.target. Dec 13 14:32:09.906818 systemd[1]: Starting lvm2-activation.service... Dec 13 14:32:09.916075 lvm[1624]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:32:09.963276 systemd[1]: Finished lvm2-activation.service. Dec 13 14:32:09.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:09.964731 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:32:09.967243 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:32:09.967290 systemd[1]: Reached target local-fs.target. Dec 13 14:32:09.970138 systemd[1]: Reached target machines.target. Dec 13 14:32:09.980270 systemd[1]: Starting ldconfig.service... Dec 13 14:32:09.983997 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:09.984078 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:09.986269 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:32:09.989965 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:32:09.993536 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:32:10.014100 systemd[1]: Starting systemd-sysext.service... Dec 13 14:32:10.036206 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1627 (bootctl) Dec 13 14:32:10.043884 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:32:10.090172 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:32:10.104218 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:10.104592 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:32:10.130668 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:32:10.142737 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:32:10.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.308674 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:32:10.335666 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:32:10.341117 systemd-fsck[1641]: fsck.fat 4.2 (2021-01-31) Dec 13 14:32:10.341117 systemd-fsck[1641]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 14:32:10.344362 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:32:10.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.348064 systemd[1]: Mounting boot.mount... Dec 13 14:32:10.382266 systemd-networkd[1513]: eth0: Gained IPv6LL Dec 13 14:32:10.387560 (sd-sysext)[1645]: Using extensions 'kubernetes'. Dec 13 14:32:10.388456 (sd-sysext)[1645]: Merged extensions into '/usr'. Dec 13 14:32:10.417450 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:32:10.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.449187 systemd[1]: Mounted boot.mount. Dec 13 14:32:10.465325 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:10.467615 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:32:10.470676 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:10.472981 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:10.479700 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:10.483364 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:10.484846 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:10.485092 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:10.485289 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:10.487952 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:10.488195 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:10.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.496137 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:10.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.496571 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:10.498210 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:10.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.501860 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:10.502125 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:10.503789 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:10.511472 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:32:10.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.521330 systemd[1]: Finished systemd-sysext.service. Dec 13 14:32:10.528902 systemd[1]: Starting ensure-sysext.service... Dec 13 14:32:10.540340 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:32:10.552777 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:32:10.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.556210 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:32:10.575345 systemd[1]: Reloading. Dec 13 14:32:10.587529 systemd-tmpfiles[1675]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:32:10.589672 systemd-tmpfiles[1675]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:32:10.596512 systemd-tmpfiles[1675]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:32:10.718120 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2024-12-13T14:32:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:10.739236 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2024-12-13T14:32:10Z" level=info msg="torcx already run" Dec 13 14:32:11.001085 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:11.001108 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:11.038465 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:11.097857 ldconfig[1626]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:32:11.138704 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:32:11.152285 systemd[1]: Finished ldconfig.service. Dec 13 14:32:11.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.157017 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:32:11.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.163004 systemd[1]: Starting audit-rules.service... Dec 13 14:32:11.166086 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:32:11.169845 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:32:11.174575 systemd[1]: Starting systemd-resolved.service... Dec 13 14:32:11.178486 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:32:11.181842 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:32:11.188606 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:32:11.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.207000 audit[1765]: SYSTEM_BOOT pid=1765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.207696 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:11.208115 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.213497 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:11.217317 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:11.221315 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:11.222522 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.222992 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:11.223250 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:11.223844 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:11.226377 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:11.227162 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:11.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.232077 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:11.232396 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:11.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.240186 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:11.245720 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:32:11.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.250478 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:11.251031 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:11.252888 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:11.253458 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.259413 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:11.267534 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:11.270280 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.270532 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:11.270753 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:11.270900 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:11.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.276917 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:11.277298 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:11.283900 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:11.284467 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.287353 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:11.293057 systemd[1]: Starting modprobe@drm.service... Dec 13 14:32:11.298669 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:11.299832 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.300018 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:11.300223 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:11.300476 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:11.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.303468 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:11.303727 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:11.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.309318 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:11.309788 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:11.312723 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:11.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.324981 systemd[1]: Finished ensure-sysext.service. Dec 13 14:32:11.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.332086 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:32:11.332361 systemd[1]: Finished modprobe@drm.service. Dec 13 14:32:11.333885 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:11.334109 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:11.336193 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.421620 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:32:11.425032 systemd[1]: Starting systemd-update-done.service... Dec 13 14:32:11.445160 systemd[1]: Finished systemd-update-done.service. Dec 13 14:32:11.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.466000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:32:11.466000 audit[1804]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc685326e0 a2=420 a3=0 items=0 ppid=1758 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:11.466000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:32:11.468814 augenrules[1804]: No rules Dec 13 14:32:11.469263 systemd[1]: Finished audit-rules.service. Dec 13 14:32:11.491222 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:32:11.492568 systemd[1]: Reached target time-set.target. Dec 13 14:32:11.508733 systemd-resolved[1761]: Positive Trust Anchors: Dec 13 14:32:11.508746 systemd-resolved[1761]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:32:11.508775 systemd-resolved[1761]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:32:11.546917 systemd-resolved[1761]: Defaulting to hostname 'linux'. Dec 13 14:32:11.548784 systemd[1]: Started systemd-resolved.service. Dec 13 14:32:11.549926 systemd[1]: Reached target network.target. Dec 13 14:32:11.550844 systemd[1]: Reached target network-online.target. Dec 13 14:32:11.554912 systemd[1]: Reached target nss-lookup.target. Dec 13 14:32:11.555824 systemd[1]: Reached target sysinit.target. Dec 13 14:32:11.561126 systemd[1]: Started motdgen.path. Dec 13 14:32:11.562128 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:32:11.563602 systemd[1]: Started logrotate.timer. Dec 13 14:32:11.565497 systemd[1]: Started mdadm.timer. Dec 13 14:32:11.568280 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:32:11.569752 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:32:11.569800 systemd[1]: Reached target paths.target. Dec 13 14:32:11.573327 systemd[1]: Reached target timers.target. Dec 13 14:32:11.576087 systemd[1]: Listening on dbus.socket. Dec 13 14:32:11.586543 systemd[1]: Starting docker.socket... Dec 13 14:32:11.595604 systemd[1]: Listening on sshd.socket. Dec 13 14:32:11.611656 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:11.612278 systemd[1]: Listening on docker.socket. Dec 13 14:32:11.615380 systemd[1]: Reached target sockets.target. Dec 13 14:32:11.621721 systemd[1]: Reached target basic.target. Dec 13 14:32:11.623309 systemd[1]: System is tainted: cgroupsv1 Dec 13 14:32:11.623778 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.624754 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.637324 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:32:11.642889 systemd[1]: Starting containerd.service... Dec 13 14:32:11.645463 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:32:11.648608 systemd[1]: Starting dbus.service... Dec 13 14:32:11.651401 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:32:11.654271 systemd[1]: Starting extend-filesystems.service... Dec 13 14:32:11.655256 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:32:11.659770 systemd[1]: Starting kubelet.service... Dec 13 14:32:11.663887 systemd[1]: Starting motdgen.service... Dec 13 14:32:11.666812 systemd[1]: Started nvidia.service. Dec 13 14:32:11.669745 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:32:11.685982 systemd[1]: Starting sshd-keygen.service... Dec 13 14:32:11.695568 systemd[1]: Starting systemd-logind.service... Dec 13 14:32:11.697440 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:11.697526 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:32:11.711625 systemd[1]: Starting update-engine.service... Dec 13 14:32:11.715604 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:32:11.789222 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:32:11.789561 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:32:11.826479 jq[1817]: false Dec 13 14:32:11.852303 jq[1830]: true Dec 13 14:32:11.833772 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:32:11.834200 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:32:11.866905 jq[1842]: true Dec 13 14:32:11.945944 extend-filesystems[1818]: Found loop1 Dec 13 14:32:11.951931 dbus-daemon[1816]: [system] SELinux support is enabled Dec 13 14:32:11.952600 systemd[1]: Started dbus.service. Dec 13 14:32:11.957220 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:32:11.957258 systemd[1]: Reached target system-config.target. Dec 13 14:32:11.958429 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:32:11.958454 systemd[1]: Reached target user-config.target. Dec 13 14:32:11.969147 extend-filesystems[1818]: Found nvme0n1 Dec 13 14:32:11.970248 extend-filesystems[1818]: Found nvme0n1p1 Dec 13 14:32:12.021050 extend-filesystems[1818]: Found nvme0n1p2 Dec 13 14:32:12.022300 extend-filesystems[1818]: Found nvme0n1p3 Dec 13 14:32:12.023380 dbus-daemon[1816]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1513 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:32:12.024763 extend-filesystems[1818]: Found usr Dec 13 14:32:12.025670 extend-filesystems[1818]: Found nvme0n1p4 Dec 13 14:32:12.027180 extend-filesystems[1818]: Found nvme0n1p6 Dec 13 14:32:12.034752 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:32:12.047969 extend-filesystems[1818]: Found nvme0n1p7 Dec 13 14:32:12.049099 extend-filesystems[1818]: Found nvme0n1p9 Dec 13 14:32:12.054784 extend-filesystems[1818]: Checking size of /dev/nvme0n1p9 Dec 13 14:32:12.091089 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:32:12.091423 systemd[1]: Finished motdgen.service. Dec 13 14:32:12.092942 amazon-ssm-agent[1813]: 2024/12/13 14:32:12 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:32:12.094031 amazon-ssm-agent[1813]: Initializing new seelog logger Dec 13 14:32:12.094228 amazon-ssm-agent[1813]: New Seelog Logger Creation Complete Dec 13 14:32:12.094332 amazon-ssm-agent[1813]: 2024/12/13 14:32:12 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:32:12.094332 amazon-ssm-agent[1813]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:32:12.096039 amazon-ssm-agent[1813]: 2024/12/13 14:32:12 processing appconfig overrides Dec 13 14:32:12.096426 bash[1875]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:32:12.097682 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:32:12.134664 extend-filesystems[1818]: Resized partition /dev/nvme0n1p9 Dec 13 14:32:12.143298 extend-filesystems[1892]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:32:12.150653 env[1834]: time="2024-12-13T14:32:12.150558118Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:32:12.162660 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:32:12.189385 update_engine[1829]: I1213 14:32:12.188604 1829 main.cc:92] Flatcar Update Engine starting Dec 13 14:32:12.195301 systemd[1]: Started update-engine.service. Dec 13 14:32:12.201237 update_engine[1829]: I1213 14:32:12.195376 1829 update_check_scheduler.cc:74] Next update check in 5m45s Dec 13 14:32:12.199279 systemd[1]: Started locksmithd.service. Dec 13 14:32:12.237672 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:32:12.279783 extend-filesystems[1892]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:32:12.279783 extend-filesystems[1892]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:32:12.279783 extend-filesystems[1892]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:32:12.279330 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:32:12.286880 extend-filesystems[1818]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:32:12.279683 systemd[1]: Finished extend-filesystems.service. Dec 13 14:32:12.352405 env[1834]: time="2024-12-13T14:32:12.352287651Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:32:12.352586 env[1834]: time="2024-12-13T14:32:12.352553024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:12.362474 env[1834]: time="2024-12-13T14:32:12.362412719Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:12.362474 env[1834]: time="2024-12-13T14:32:12.362469691Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:12.362885 env[1834]: time="2024-12-13T14:32:12.362853731Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:12.362973 env[1834]: time="2024-12-13T14:32:12.362887503Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:12.362973 env[1834]: time="2024-12-13T14:32:12.362906423Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:32:12.362973 env[1834]: time="2024-12-13T14:32:12.362921060Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:12.363087 env[1834]: time="2024-12-13T14:32:12.363025333Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:12.363326 env[1834]: time="2024-12-13T14:32:12.363301778Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:12.364949 env[1834]: time="2024-12-13T14:32:12.364913514Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:12.365029 env[1834]: time="2024-12-13T14:32:12.364949319Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:32:12.365072 env[1834]: time="2024-12-13T14:32:12.365028267Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:32:12.365072 env[1834]: time="2024-12-13T14:32:12.365048410Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:32:12.387006 env[1834]: time="2024-12-13T14:32:12.386958840Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:32:12.387223 env[1834]: time="2024-12-13T14:32:12.387033128Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:32:12.387223 env[1834]: time="2024-12-13T14:32:12.387051544Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:32:12.387322 env[1834]: time="2024-12-13T14:32:12.387224642Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.387322 env[1834]: time="2024-12-13T14:32:12.387252288Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.387432 env[1834]: time="2024-12-13T14:32:12.387334536Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.387432 env[1834]: time="2024-12-13T14:32:12.387356782Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.387432 env[1834]: time="2024-12-13T14:32:12.387378509Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.387924 env[1834]: time="2024-12-13T14:32:12.387888078Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.388002 env[1834]: time="2024-12-13T14:32:12.387937293Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.388002 env[1834]: time="2024-12-13T14:32:12.387974069Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.388002 env[1834]: time="2024-12-13T14:32:12.387994905Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:32:12.388220 env[1834]: time="2024-12-13T14:32:12.388200391Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:32:12.388406 env[1834]: time="2024-12-13T14:32:12.388385067Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:32:12.389345 env[1834]: time="2024-12-13T14:32:12.389314755Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:32:12.389469 env[1834]: time="2024-12-13T14:32:12.389419310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389469 env[1834]: time="2024-12-13T14:32:12.389459752Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:32:12.389572 env[1834]: time="2024-12-13T14:32:12.389554679Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389627 env[1834]: time="2024-12-13T14:32:12.389581311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389709 env[1834]: time="2024-12-13T14:32:12.389691192Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389754 env[1834]: time="2024-12-13T14:32:12.389719631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389795 env[1834]: time="2024-12-13T14:32:12.389740426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389795 env[1834]: time="2024-12-13T14:32:12.389776898Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389870 env[1834]: time="2024-12-13T14:32:12.389795870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389870 env[1834]: time="2024-12-13T14:32:12.389814410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.389870 env[1834]: time="2024-12-13T14:32:12.389852695Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:32:12.390087 env[1834]: time="2024-12-13T14:32:12.390052223Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.390141 env[1834]: time="2024-12-13T14:32:12.390096317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.390141 env[1834]: time="2024-12-13T14:32:12.390116461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.390223 env[1834]: time="2024-12-13T14:32:12.390149722Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:32:12.390223 env[1834]: time="2024-12-13T14:32:12.390173899Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:32:12.390223 env[1834]: time="2024-12-13T14:32:12.390191159Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:32:12.390445 env[1834]: time="2024-12-13T14:32:12.390232494Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:32:12.390445 env[1834]: time="2024-12-13T14:32:12.390400712Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:32:12.390870 env[1834]: time="2024-12-13T14:32:12.390778941Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.390900751Z" level=info msg="Connect containerd service" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.390950170Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392071833Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392266459Z" level=info msg="Start subscribing containerd event" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392328204Z" level=info msg="Start recovering state" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392412940Z" level=info msg="Start event monitor" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392427293Z" level=info msg="Start snapshots syncer" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392439150Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.392450160Z" level=info msg="Start streaming server" Dec 13 14:32:12.396985 env[1834]: time="2024-12-13T14:32:12.396926344Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:32:12.397542 env[1834]: time="2024-12-13T14:32:12.397020750Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:32:12.427237 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:32:12.439961 systemd[1]: Started containerd.service. Dec 13 14:32:12.442827 env[1834]: time="2024-12-13T14:32:12.440101241Z" level=info msg="containerd successfully booted in 0.303188s" Dec 13 14:32:12.456199 systemd-logind[1828]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:32:12.463749 systemd-logind[1828]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:32:12.464050 systemd-logind[1828]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:32:12.469778 systemd-logind[1828]: New seat seat0. Dec 13 14:32:12.475083 systemd[1]: Started systemd-logind.service. Dec 13 14:32:12.740126 dbus-daemon[1816]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:32:12.740314 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:32:12.742851 dbus-daemon[1816]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1876 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:32:12.746963 systemd[1]: Starting polkit.service... Dec 13 14:32:12.779995 polkitd[1947]: Started polkitd version 121 Dec 13 14:32:12.804108 polkitd[1947]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:32:12.804758 polkitd[1947]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:32:12.823692 polkitd[1947]: Finished loading, compiling and executing 2 rules Dec 13 14:32:12.827201 dbus-daemon[1816]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:32:12.827386 systemd[1]: Started polkit.service. Dec 13 14:32:12.832729 polkitd[1947]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:32:12.852870 systemd-hostnamed[1876]: Hostname set to (transient) Dec 13 14:32:12.853983 systemd-resolved[1761]: System hostname changed to 'ip-172-31-21-211'. Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Create new startup processor Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing bookkeeping folders Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO removing the completed state files Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing healthcheck folders for long running plugins Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing locations for inventory plugin Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing default location for custom inventory Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing default location for file inventory Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Initializing default location for role inventory Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Init the cloudwatchlogs publisher Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:32:12.898369 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:32:12.899321 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:32:12.899321 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:32:12.899321 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO OS: linux, Arch: amd64 Dec 13 14:32:12.901315 amazon-ssm-agent[1813]: datastore file /var/lib/amazon/ssm/i-0669502412e7b8652/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:32:12.923473 coreos-metadata[1815]: Dec 13 14:32:12.923 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:32:12.926054 coreos-metadata[1815]: Dec 13 14:32:12.925 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:32:12.926921 coreos-metadata[1815]: Dec 13 14:32:12.926 INFO Fetch successful Dec 13 14:32:12.927083 coreos-metadata[1815]: Dec 13 14:32:12.927 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:32:12.927739 coreos-metadata[1815]: Dec 13 14:32:12.927 INFO Fetch successful Dec 13 14:32:12.932910 unknown[1815]: wrote ssh authorized keys file for user: core Dec 13 14:32:12.970690 update-ssh-keys[2001]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:32:12.971491 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:32:12.997836 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:32:13.092457 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:32:13.186724 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:32:13.285074 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:32:13.379941 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:32:13.474456 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [instanceID=i-0669502412e7b8652] Starting association polling Dec 13 14:32:13.508665 locksmithd[1898]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:32:13.570108 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:32:13.664862 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:32:13.719198 systemd[1]: Started kubelet.service. Dec 13 14:32:13.723819 sshd_keygen[1845]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:32:13.760475 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:32:13.762527 systemd[1]: Finished sshd-keygen.service. Dec 13 14:32:13.766455 systemd[1]: Starting issuegen.service... Dec 13 14:32:13.792155 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:32:13.792451 systemd[1]: Finished issuegen.service. Dec 13 14:32:13.799373 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:32:13.825550 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:32:13.836110 systemd[1]: Started getty@tty1.service. Dec 13 14:32:13.841630 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:32:13.844125 systemd[1]: Reached target getty.target. Dec 13 14:32:13.845289 systemd[1]: Reached target multi-user.target. Dec 13 14:32:13.848893 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:32:13.856675 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:32:13.865682 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:32:13.866236 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:32:13.869194 systemd[1]: Startup finished in 9.279s (kernel) + 11.503s (userspace) = 20.783s. Dec 13 14:32:13.952649 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:32:14.049587 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:32:14.145972 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:32:14.242322 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:32:14.339002 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:32:14.436062 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0669502412e7b8652, requestId: 2f0ee39e-595f-471d-9ce3-f9efe55cb6ab Dec 13 14:32:14.533082 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [OfflineService] Starting document processing engine... Dec 13 14:32:14.630373 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:32:14.727956 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:32:14.825699 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [OfflineService] Starting message polling Dec 13 14:32:14.928426 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [OfflineService] Starting send replies to MDS Dec 13 14:32:15.026599 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:32:15.048924 kubelet[2041]: E1213 14:32:15.048854 2041 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:15.051480 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:15.051725 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:15.124846 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:32:15.223279 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessageGatewayService] listening reply. Dec 13 14:32:15.322005 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:32:15.420807 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:32:15.519874 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:32:15.619224 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:32:15.718630 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:32:15.818272 amazon-ssm-agent[1813]: 2024-12-13 14:32:12 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0669502412e7b8652?role=subscribe&stream=input Dec 13 14:32:15.918216 amazon-ssm-agent[1813]: 2024-12-13 14:32:13 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0669502412e7b8652?role=subscribe&stream=input Dec 13 14:32:16.018156 amazon-ssm-agent[1813]: 2024-12-13 14:32:13 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:32:16.118409 amazon-ssm-agent[1813]: 2024-12-13 14:32:13 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:32:20.241243 systemd[1]: Created slice system-sshd.slice. Dec 13 14:32:20.244601 systemd[1]: Started sshd@0-172.31.21.211:22-139.178.89.65:52282.service. Dec 13 14:32:20.471998 sshd[2069]: Accepted publickey for core from 139.178.89.65 port 52282 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:20.480039 sshd[2069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:20.516700 systemd[1]: Created slice user-500.slice. Dec 13 14:32:20.523780 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:32:20.529384 systemd-logind[1828]: New session 1 of user core. Dec 13 14:32:20.561821 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:32:20.570310 systemd[1]: Starting user@500.service... Dec 13 14:32:20.592728 (systemd)[2074]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:20.799446 systemd[2074]: Queued start job for default target default.target. Dec 13 14:32:20.800927 systemd[2074]: Reached target paths.target. Dec 13 14:32:20.801128 systemd[2074]: Reached target sockets.target. Dec 13 14:32:20.801306 systemd[2074]: Reached target timers.target. Dec 13 14:32:20.801579 systemd[2074]: Reached target basic.target. Dec 13 14:32:20.803298 systemd[2074]: Reached target default.target. Dec 13 14:32:20.803343 systemd[2074]: Startup finished in 184ms. Dec 13 14:32:20.816730 systemd[1]: Started user@500.service. Dec 13 14:32:20.818203 systemd[1]: Started session-1.scope. Dec 13 14:32:21.006324 systemd[1]: Started sshd@1-172.31.21.211:22-139.178.89.65:52290.service. Dec 13 14:32:21.190989 sshd[2083]: Accepted publickey for core from 139.178.89.65 port 52290 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:21.193083 sshd[2083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:21.200861 systemd-logind[1828]: New session 2 of user core. Dec 13 14:32:21.201516 systemd[1]: Started session-2.scope. Dec 13 14:32:21.338143 sshd[2083]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:21.345247 systemd[1]: sshd@1-172.31.21.211:22-139.178.89.65:52290.service: Deactivated successfully. Dec 13 14:32:21.349305 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:32:21.357832 systemd-logind[1828]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:32:21.368058 systemd[1]: Started sshd@2-172.31.21.211:22-139.178.89.65:52300.service. Dec 13 14:32:21.369462 systemd-logind[1828]: Removed session 2. Dec 13 14:32:21.545149 sshd[2090]: Accepted publickey for core from 139.178.89.65 port 52300 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:21.546477 sshd[2090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:21.568718 systemd-logind[1828]: New session 3 of user core. Dec 13 14:32:21.569182 systemd[1]: Started session-3.scope. Dec 13 14:32:21.710764 sshd[2090]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:21.723099 systemd[1]: sshd@2-172.31.21.211:22-139.178.89.65:52300.service: Deactivated successfully. Dec 13 14:32:21.725087 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:32:21.727479 systemd-logind[1828]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:32:21.730305 systemd-logind[1828]: Removed session 3. Dec 13 14:32:21.735471 systemd[1]: Started sshd@3-172.31.21.211:22-139.178.89.65:52312.service. Dec 13 14:32:21.904821 sshd[2097]: Accepted publickey for core from 139.178.89.65 port 52312 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:21.907476 sshd[2097]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:21.913716 systemd-logind[1828]: New session 4 of user core. Dec 13 14:32:21.914109 systemd[1]: Started session-4.scope. Dec 13 14:32:22.074387 sshd[2097]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:22.078876 systemd[1]: sshd@3-172.31.21.211:22-139.178.89.65:52312.service: Deactivated successfully. Dec 13 14:32:22.082233 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:32:22.082266 systemd-logind[1828]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:32:22.083686 systemd-logind[1828]: Removed session 4. Dec 13 14:32:22.110280 systemd[1]: Started sshd@4-172.31.21.211:22-139.178.89.65:52320.service. Dec 13 14:32:22.297715 sshd[2104]: Accepted publickey for core from 139.178.89.65 port 52320 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:22.299219 sshd[2104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:22.314927 systemd[1]: Started session-5.scope. Dec 13 14:32:22.315497 systemd-logind[1828]: New session 5 of user core. Dec 13 14:32:22.464954 sudo[2108]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:32:22.465596 sudo[2108]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:22.481935 dbus-daemon[1816]: \xd0=\xc7@\xd4U: received setenforce notice (enforcing=2018778896) Dec 13 14:32:22.485228 sudo[2108]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:22.509361 sshd[2104]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:22.517849 systemd[1]: sshd@4-172.31.21.211:22-139.178.89.65:52320.service: Deactivated successfully. Dec 13 14:32:22.519719 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:32:22.520275 systemd-logind[1828]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:32:22.523296 systemd-logind[1828]: Removed session 5. Dec 13 14:32:22.537000 systemd[1]: Started sshd@5-172.31.21.211:22-139.178.89.65:52326.service. Dec 13 14:32:22.730007 sshd[2112]: Accepted publickey for core from 139.178.89.65 port 52326 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:22.731058 sshd[2112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:22.757762 systemd[1]: Started session-6.scope. Dec 13 14:32:22.758518 systemd-logind[1828]: New session 6 of user core. Dec 13 14:32:22.875171 sudo[2117]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:32:22.875497 sudo[2117]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:22.891499 sudo[2117]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:22.918608 sudo[2116]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:32:22.926030 sudo[2116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:22.951376 amazon-ssm-agent[1813]: 2024-12-13 14:32:22 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:32:22.957583 systemd[1]: Stopping audit-rules.service... Dec 13 14:32:22.964330 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:32:22.964428 kernel: audit: type=1305 audit(1734100342.958:159): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:32:22.958000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:32:22.961349 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:32:22.964631 auditctl[2120]: No rules Dec 13 14:32:22.973543 kernel: audit: type=1300 audit(1734100342.958:159): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7d9ea1e0 a2=420 a3=0 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:22.958000 audit[2120]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc7d9ea1e0 a2=420 a3=0 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:22.961701 systemd[1]: Stopped audit-rules.service. Dec 13 14:32:22.964855 systemd[1]: Starting audit-rules.service... Dec 13 14:32:22.958000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:32:22.985055 kernel: audit: type=1327 audit(1734100342.958:159): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:32:22.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.005669 kernel: audit: type=1131 audit(1734100342.960:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.041927 augenrules[2138]: No rules Dec 13 14:32:23.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.044551 sudo[2116]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:23.043050 systemd[1]: Finished audit-rules.service. Dec 13 14:32:23.041000 audit[2116]: USER_END pid=2116 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.052432 kernel: audit: type=1130 audit(1734100343.041:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.052542 kernel: audit: type=1106 audit(1734100343.041:162): pid=2116 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.052572 kernel: audit: type=1104 audit(1734100343.041:163): pid=2116 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.041000 audit[2116]: CRED_DISP pid=2116 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.071362 sshd[2112]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:23.071000 audit[2112]: USER_END pid=2112 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.076050 systemd-logind[1828]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:32:23.077184 systemd[1]: sshd@5-172.31.21.211:22-139.178.89.65:52326.service: Deactivated successfully. Dec 13 14:32:23.078216 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:32:23.079812 kernel: audit: type=1106 audit(1734100343.071:164): pid=2112 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.071000 audit[2112]: CRED_DISP pid=2112 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.086822 kernel: audit: type=1104 audit(1734100343.071:165): pid=2112 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.080477 systemd-logind[1828]: Removed session 6. Dec 13 14:32:23.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.211:22-139.178.89.65:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.092463 kernel: audit: type=1131 audit(1734100343.071:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.211:22-139.178.89.65:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.094059 systemd[1]: Started sshd@6-172.31.21.211:22-139.178.89.65:52334.service. Dec 13 14:32:23.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.211:22-139.178.89.65:52334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.249000 audit[2145]: USER_ACCT pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.251880 sshd[2145]: Accepted publickey for core from 139.178.89.65 port 52334 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:23.251000 audit[2145]: CRED_ACQ pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.252000 audit[2145]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3a3d3f0 a2=3 a3=0 items=0 ppid=1 pid=2145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:23.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:23.254048 sshd[2145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:23.261197 systemd[1]: Started session-7.scope. Dec 13 14:32:23.261744 systemd-logind[1828]: New session 7 of user core. Dec 13 14:32:23.267000 audit[2145]: USER_START pid=2145 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.270000 audit[2148]: CRED_ACQ pid=2148 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:23.382000 audit[2149]: USER_ACCT pid=2149 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.383902 sudo[2149]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:32:23.382000 audit[2149]: CRED_REFR pid=2149 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.384316 sudo[2149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:23.391000 audit[2149]: USER_START pid=2149 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.429384 systemd[1]: Starting coreos-metadata.service... Dec 13 14:32:23.548473 coreos-metadata[2153]: Dec 13 14:32:23.548 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:32:23.550900 coreos-metadata[2153]: Dec 13 14:32:23.550 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Dec 13 14:32:23.552501 coreos-metadata[2153]: Dec 13 14:32:23.552 INFO Fetch successful Dec 13 14:32:23.552661 coreos-metadata[2153]: Dec 13 14:32:23.552 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Dec 13 14:32:23.555086 coreos-metadata[2153]: Dec 13 14:32:23.555 INFO Fetch successful Dec 13 14:32:23.555086 coreos-metadata[2153]: Dec 13 14:32:23.555 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Dec 13 14:32:23.556816 coreos-metadata[2153]: Dec 13 14:32:23.556 INFO Fetch successful Dec 13 14:32:23.556935 coreos-metadata[2153]: Dec 13 14:32:23.556 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Dec 13 14:32:23.557843 coreos-metadata[2153]: Dec 13 14:32:23.557 INFO Fetch successful Dec 13 14:32:23.557996 coreos-metadata[2153]: Dec 13 14:32:23.557 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Dec 13 14:32:23.559185 coreos-metadata[2153]: Dec 13 14:32:23.559 INFO Fetch successful Dec 13 14:32:23.559303 coreos-metadata[2153]: Dec 13 14:32:23.559 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Dec 13 14:32:23.560569 coreos-metadata[2153]: Dec 13 14:32:23.560 INFO Fetch successful Dec 13 14:32:23.560710 coreos-metadata[2153]: Dec 13 14:32:23.560 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Dec 13 14:32:23.562044 coreos-metadata[2153]: Dec 13 14:32:23.561 INFO Fetch successful Dec 13 14:32:23.562142 coreos-metadata[2153]: Dec 13 14:32:23.562 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Dec 13 14:32:23.563168 coreos-metadata[2153]: Dec 13 14:32:23.563 INFO Fetch successful Dec 13 14:32:23.584020 systemd[1]: Finished coreos-metadata.service. Dec 13 14:32:23.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:24.918719 systemd[1]: Stopped kubelet.service. Dec 13 14:32:24.922374 systemd[1]: Starting kubelet.service... Dec 13 14:32:24.962863 systemd[1]: Reloading. Dec 13 14:32:25.149645 /usr/lib/systemd/system-generators/torcx-generator[2216]: time="2024-12-13T14:32:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:25.155738 /usr/lib/systemd/system-generators/torcx-generator[2216]: time="2024-12-13T14:32:25Z" level=info msg="torcx already run" Dec 13 14:32:25.369515 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:25.370047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:25.409593 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:25.595236 systemd[1]: Started kubelet.service. Dec 13 14:32:25.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:25.599328 systemd[1]: Stopping kubelet.service... Dec 13 14:32:25.605026 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:32:25.606063 systemd[1]: Stopped kubelet.service. Dec 13 14:32:25.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:25.623647 systemd[1]: Starting kubelet.service... Dec 13 14:32:26.122743 systemd[1]: Started kubelet.service. Dec 13 14:32:26.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:26.247999 kubelet[2290]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:32:26.248610 kubelet[2290]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:32:26.248610 kubelet[2290]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:32:26.248746 kubelet[2290]: I1213 14:32:26.248709 2290 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:32:26.568516 kubelet[2290]: I1213 14:32:26.567942 2290 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:32:26.568516 kubelet[2290]: I1213 14:32:26.567975 2290 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:32:26.568516 kubelet[2290]: I1213 14:32:26.568318 2290 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:32:26.638440 kubelet[2290]: I1213 14:32:26.638399 2290 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:32:26.650760 kubelet[2290]: I1213 14:32:26.650733 2290 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:32:26.651385 kubelet[2290]: I1213 14:32:26.651361 2290 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:32:26.651592 kubelet[2290]: I1213 14:32:26.651571 2290 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:32:26.651759 kubelet[2290]: I1213 14:32:26.651605 2290 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:32:26.651759 kubelet[2290]: I1213 14:32:26.651619 2290 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:32:26.651845 kubelet[2290]: I1213 14:32:26.651770 2290 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:32:26.652043 kubelet[2290]: I1213 14:32:26.652004 2290 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:32:26.652043 kubelet[2290]: I1213 14:32:26.652025 2290 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:32:26.652131 kubelet[2290]: I1213 14:32:26.652059 2290 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:32:26.652131 kubelet[2290]: I1213 14:32:26.652080 2290 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:32:26.652809 kubelet[2290]: E1213 14:32:26.652783 2290 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:26.654026 kubelet[2290]: E1213 14:32:26.653544 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:26.655267 kubelet[2290]: I1213 14:32:26.655248 2290 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:32:26.659632 kubelet[2290]: I1213 14:32:26.659593 2290 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:32:26.663700 kubelet[2290]: W1213 14:32:26.663674 2290 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:32:26.663877 kubelet[2290]: E1213 14:32:26.663867 2290 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:32:26.663974 kubelet[2290]: W1213 14:32:26.663959 2290 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:32:26.664079 kubelet[2290]: W1213 14:32:26.664067 2290 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "172.31.21.211" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:32:26.664154 kubelet[2290]: E1213 14:32:26.664145 2290 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.21.211" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:32:26.664687 kubelet[2290]: I1213 14:32:26.664666 2290 server.go:1256] "Started kubelet" Dec 13 14:32:26.664000 audit[2290]: AVC avc: denied { mac_admin } for pid=2290 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.664000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:26.664000 audit[2290]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7bcb0 a1=c0009baa68 a2=c000a7bc80 a3=25 items=0 ppid=1 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.664000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:26.664000 audit[2290]: AVC avc: denied { mac_admin } for pid=2290 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.664000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:26.664000 audit[2290]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c60000 a1=c0009baa80 a2=c000a7bd40 a3=25 items=0 ppid=1 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.664000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:26.667922 kubelet[2290]: I1213 14:32:26.666095 2290 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:32:26.667922 kubelet[2290]: I1213 14:32:26.666142 2290 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:32:26.667922 kubelet[2290]: I1213 14:32:26.666215 2290 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:32:26.684929 kubelet[2290]: I1213 14:32:26.684900 2290 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:32:26.687011 kubelet[2290]: I1213 14:32:26.686988 2290 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:32:26.705287 kubelet[2290]: E1213 14:32:26.690486 2290 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.211.1810c313dfd3718d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.211,UID:172.31.21.211,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.21.211,},FirstTimestamp:2024-12-13 14:32:26.664612237 +0000 UTC m=+0.519321369,LastTimestamp:2024-12-13 14:32:26.664612237 +0000 UTC m=+0.519321369,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.211,}" Dec 13 14:32:26.705287 kubelet[2290]: E1213 14:32:26.691984 2290 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:32:26.705287 kubelet[2290]: E1213 14:32:26.705052 2290 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.21.211.1810c313e1741d2c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.21.211,UID:172.31.21.211,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.21.211,},FirstTimestamp:2024-12-13 14:32:26.691919148 +0000 UTC m=+0.546628264,LastTimestamp:2024-12-13 14:32:26.691919148 +0000 UTC m=+0.546628264,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.211,}" Dec 13 14:32:26.712303 kubelet[2290]: I1213 14:32:26.705141 2290 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:32:26.716349 kubelet[2290]: I1213 14:32:26.716309 2290 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:32:26.717737 kubelet[2290]: I1213 14:32:26.717712 2290 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:32:26.717937 kubelet[2290]: I1213 14:32:26.717926 2290 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:32:26.724174 kubelet[2290]: I1213 14:32:26.724134 2290 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:32:26.745272 kubelet[2290]: W1213 14:32:26.745020 2290 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:32:26.745272 kubelet[2290]: E1213 14:32:26.745060 2290 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:32:26.745272 kubelet[2290]: E1213 14:32:26.745218 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.21.211\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:32:26.750703 kubelet[2290]: I1213 14:32:26.750674 2290 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:32:26.750703 kubelet[2290]: I1213 14:32:26.750711 2290 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:32:26.750891 kubelet[2290]: I1213 14:32:26.750833 2290 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:32:26.772000 audit[2303]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.772000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec9c7a3b0 a2=0 a3=7ffec9c7a39c items=0 ppid=2290 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:32:26.776000 audit[2308]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.776000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe52702eb0 a2=0 a3=7ffe52702e9c items=0 ppid=2290 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:32:26.782061 kubelet[2290]: I1213 14:32:26.782039 2290 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:32:26.782193 kubelet[2290]: I1213 14:32:26.782186 2290 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:32:26.782243 kubelet[2290]: I1213 14:32:26.782238 2290 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:32:26.800246 kubelet[2290]: I1213 14:32:26.800201 2290 policy_none.go:49] "None policy: Start" Dec 13 14:32:26.801728 kubelet[2290]: I1213 14:32:26.801707 2290 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:32:26.801902 kubelet[2290]: I1213 14:32:26.801884 2290 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:32:26.781000 audit[2310]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.781000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7e1d5cc0 a2=0 a3=7ffd7e1d5cac items=0 ppid=2290 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:26.803000 audit[2315]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.803000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb30230f0 a2=0 a3=7ffdb30230dc items=0 ppid=2290 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:26.808443 kubelet[2290]: I1213 14:32:26.808401 2290 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:32:26.806000 audit[2290]: AVC avc: denied { mac_admin } for pid=2290 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.806000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:26.806000 audit[2290]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ebac60 a1=c000e81710 a2=c000ebac30 a3=25 items=0 ppid=1 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.806000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:26.808832 kubelet[2290]: I1213 14:32:26.808494 2290 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:32:26.808832 kubelet[2290]: I1213 14:32:26.808770 2290 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:32:26.815898 kubelet[2290]: E1213 14:32:26.815873 2290 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.21.211\" not found" Dec 13 14:32:26.817927 kubelet[2290]: I1213 14:32:26.817905 2290 kubelet_node_status.go:73] "Attempting to register node" node="172.31.21.211" Dec 13 14:32:26.833765 kubelet[2290]: I1213 14:32:26.833665 2290 kubelet_node_status.go:76] "Successfully registered node" node="172.31.21.211" Dec 13 14:32:26.868363 kubelet[2290]: E1213 14:32:26.868268 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:26.879000 audit[2320]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.879000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdf33db150 a2=0 a3=7ffdf33db13c items=0 ppid=2290 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:32:26.882296 kubelet[2290]: I1213 14:32:26.882266 2290 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:32:26.882000 audit[2321]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:26.882000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc720e8100 a2=0 a3=7ffc720e80ec items=0 ppid=2290 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:32:26.883000 audit[2322]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.883000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0c3362f0 a2=0 a3=7ffc0c3362dc items=0 ppid=2290 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:32:26.885232 kubelet[2290]: I1213 14:32:26.885203 2290 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:32:26.885363 kubelet[2290]: I1213 14:32:26.885349 2290 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:32:26.885531 kubelet[2290]: I1213 14:32:26.885448 2290 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:32:26.885726 kubelet[2290]: E1213 14:32:26.885712 2290 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:32:26.886000 audit[2323]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.886000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe748a0610 a2=0 a3=7ffe748a05fc items=0 ppid=2290 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:32:26.887000 audit[2324]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:26.887000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8ec03950 a2=0 a3=10e3 items=0 ppid=2290 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:32:26.888000 audit[2325]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:26.888000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbf281230 a2=0 a3=7ffdbf28121c items=0 ppid=2290 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:32:26.889000 audit[2326]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:26.889000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffc62a0010 a2=0 a3=7fffc629fffc items=0 ppid=2290 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:32:26.890000 audit[2327]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:26.890000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff324338b0 a2=0 a3=7fff3243389c items=0 ppid=2290 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:32:26.968781 kubelet[2290]: E1213 14:32:26.968746 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.070510 kubelet[2290]: E1213 14:32:27.070462 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.171267 kubelet[2290]: E1213 14:32:27.171106 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.271786 kubelet[2290]: E1213 14:32:27.271740 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.372442 kubelet[2290]: E1213 14:32:27.372393 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.473144 kubelet[2290]: E1213 14:32:27.473018 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.570850 kubelet[2290]: I1213 14:32:27.570790 2290 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:32:27.571036 kubelet[2290]: W1213 14:32:27.571014 2290 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:32:27.574011 kubelet[2290]: E1213 14:32:27.573974 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.654733 kubelet[2290]: E1213 14:32:27.654682 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:27.662207 sudo[2149]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:27.660000 audit[2149]: USER_END pid=2149 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:27.660000 audit[2149]: CRED_DISP pid=2149 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:27.675036 kubelet[2290]: E1213 14:32:27.674989 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.688270 sshd[2145]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:27.693000 audit[2145]: USER_END pid=2145 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:27.693000 audit[2145]: CRED_DISP pid=2145 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:27.697306 systemd[1]: sshd@6-172.31.21.211:22-139.178.89.65:52334.service: Deactivated successfully. Dec 13 14:32:27.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.211:22-139.178.89.65:52334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:27.699087 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:32:27.700169 systemd-logind[1828]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:32:27.706427 systemd-logind[1828]: Removed session 7. Dec 13 14:32:27.776203 kubelet[2290]: E1213 14:32:27.776096 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.876983 kubelet[2290]: E1213 14:32:27.876930 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:27.977526 kubelet[2290]: E1213 14:32:27.977465 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:28.078296 kubelet[2290]: E1213 14:32:28.078162 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:28.179078 kubelet[2290]: E1213 14:32:28.179024 2290 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.21.211\" not found" Dec 13 14:32:28.280346 kubelet[2290]: I1213 14:32:28.280317 2290 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:32:28.281185 env[1834]: time="2024-12-13T14:32:28.281081446Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:32:28.281747 kubelet[2290]: I1213 14:32:28.281722 2290 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:32:28.655251 kubelet[2290]: I1213 14:32:28.655201 2290 apiserver.go:52] "Watching apiserver" Dec 13 14:32:28.655500 kubelet[2290]: E1213 14:32:28.655196 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:28.661647 kubelet[2290]: I1213 14:32:28.661581 2290 topology_manager.go:215] "Topology Admit Handler" podUID="107c299f-32fc-413d-96e1-2cb26cb02b33" podNamespace="calico-system" podName="calico-node-4f647" Dec 13 14:32:28.661806 kubelet[2290]: I1213 14:32:28.661735 2290 topology_manager.go:215] "Topology Admit Handler" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" podNamespace="calico-system" podName="csi-node-driver-9pd9n" Dec 13 14:32:28.661806 kubelet[2290]: I1213 14:32:28.661795 2290 topology_manager.go:215] "Topology Admit Handler" podUID="77ed99be-de8d-4092-b637-98dd7edd2c81" podNamespace="kube-system" podName="kube-proxy-ch2kv" Dec 13 14:32:28.662691 kubelet[2290]: E1213 14:32:28.662221 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:28.718968 kubelet[2290]: I1213 14:32:28.718940 2290 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:32:28.732003 kubelet[2290]: I1213 14:32:28.731968 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/77ed99be-de8d-4092-b637-98dd7edd2c81-xtables-lock\") pod \"kube-proxy-ch2kv\" (UID: \"77ed99be-de8d-4092-b637-98dd7edd2c81\") " pod="kube-system/kube-proxy-ch2kv" Dec 13 14:32:28.732403 kubelet[2290]: I1213 14:32:28.732382 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-lib-modules\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.732613 kubelet[2290]: I1213 14:32:28.732600 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/107c299f-32fc-413d-96e1-2cb26cb02b33-tigera-ca-bundle\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.732752 kubelet[2290]: I1213 14:32:28.732741 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4f09de66-c27e-4908-9687-1007fc5643ee-socket-dir\") pod \"csi-node-driver-9pd9n\" (UID: \"4f09de66-c27e-4908-9687-1007fc5643ee\") " pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:28.733383 kubelet[2290]: I1213 14:32:28.732854 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvbtl\" (UniqueName: \"kubernetes.io/projected/107c299f-32fc-413d-96e1-2cb26cb02b33-kube-api-access-jvbtl\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.733698 kubelet[2290]: I1213 14:32:28.733679 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4f09de66-c27e-4908-9687-1007fc5643ee-registration-dir\") pod \"csi-node-driver-9pd9n\" (UID: \"4f09de66-c27e-4908-9687-1007fc5643ee\") " pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:28.733783 kubelet[2290]: I1213 14:32:28.733723 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l9v6q\" (UniqueName: \"kubernetes.io/projected/4f09de66-c27e-4908-9687-1007fc5643ee-kube-api-access-l9v6q\") pod \"csi-node-driver-9pd9n\" (UID: \"4f09de66-c27e-4908-9687-1007fc5643ee\") " pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:28.733783 kubelet[2290]: I1213 14:32:28.733756 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/77ed99be-de8d-4092-b637-98dd7edd2c81-lib-modules\") pod \"kube-proxy-ch2kv\" (UID: \"77ed99be-de8d-4092-b637-98dd7edd2c81\") " pod="kube-system/kube-proxy-ch2kv" Dec 13 14:32:28.733885 kubelet[2290]: I1213 14:32:28.733787 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrh4k\" (UniqueName: \"kubernetes.io/projected/77ed99be-de8d-4092-b637-98dd7edd2c81-kube-api-access-vrh4k\") pod \"kube-proxy-ch2kv\" (UID: \"77ed99be-de8d-4092-b637-98dd7edd2c81\") " pod="kube-system/kube-proxy-ch2kv" Dec 13 14:32:28.733885 kubelet[2290]: I1213 14:32:28.733819 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-xtables-lock\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.733885 kubelet[2290]: I1213 14:32:28.733850 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/107c299f-32fc-413d-96e1-2cb26cb02b33-node-certs\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.733885 kubelet[2290]: I1213 14:32:28.733880 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-net-dir\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734322 kubelet[2290]: I1213 14:32:28.733909 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-bin-dir\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734322 kubelet[2290]: I1213 14:32:28.733940 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4f09de66-c27e-4908-9687-1007fc5643ee-kubelet-dir\") pod \"csi-node-driver-9pd9n\" (UID: \"4f09de66-c27e-4908-9687-1007fc5643ee\") " pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:28.734322 kubelet[2290]: I1213 14:32:28.734035 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/77ed99be-de8d-4092-b637-98dd7edd2c81-kube-proxy\") pod \"kube-proxy-ch2kv\" (UID: \"77ed99be-de8d-4092-b637-98dd7edd2c81\") " pod="kube-system/kube-proxy-ch2kv" Dec 13 14:32:28.734322 kubelet[2290]: I1213 14:32:28.734075 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-policysync\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734322 kubelet[2290]: I1213 14:32:28.734315 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-run-calico\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734678 kubelet[2290]: I1213 14:32:28.734384 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-lib-calico\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734678 kubelet[2290]: I1213 14:32:28.734419 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-log-dir\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734678 kubelet[2290]: I1213 14:32:28.734485 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-flexvol-driver-host\") pod \"calico-node-4f647\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " pod="calico-system/calico-node-4f647" Dec 13 14:32:28.734678 kubelet[2290]: I1213 14:32:28.734552 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4f09de66-c27e-4908-9687-1007fc5643ee-varrun\") pod \"csi-node-driver-9pd9n\" (UID: \"4f09de66-c27e-4908-9687-1007fc5643ee\") " pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:28.837478 kubelet[2290]: E1213 14:32:28.837448 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.838154 kubelet[2290]: W1213 14:32:28.838133 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.838390 kubelet[2290]: E1213 14:32:28.838299 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.839487 kubelet[2290]: E1213 14:32:28.839323 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.839487 kubelet[2290]: W1213 14:32:28.839340 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.839703 kubelet[2290]: E1213 14:32:28.839501 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.840080 kubelet[2290]: E1213 14:32:28.840060 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.840080 kubelet[2290]: W1213 14:32:28.840075 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.840566 kubelet[2290]: E1213 14:32:28.840552 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.840837 kubelet[2290]: W1213 14:32:28.840568 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.841015 kubelet[2290]: E1213 14:32:28.840965 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.841204 kubelet[2290]: E1213 14:32:28.841035 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.841460 kubelet[2290]: W1213 14:32:28.841210 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.841549 kubelet[2290]: E1213 14:32:28.841050 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.841549 kubelet[2290]: E1213 14:32:28.841541 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.842002 kubelet[2290]: E1213 14:32:28.841982 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.842002 kubelet[2290]: W1213 14:32:28.841997 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.842588 kubelet[2290]: E1213 14:32:28.842573 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.842785 kubelet[2290]: E1213 14:32:28.842604 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.842785 kubelet[2290]: W1213 14:32:28.842778 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.842985 kubelet[2290]: E1213 14:32:28.842967 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.843172 kubelet[2290]: E1213 14:32:28.843089 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.843234 kubelet[2290]: W1213 14:32:28.843143 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.843296 kubelet[2290]: E1213 14:32:28.843283 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.843479 kubelet[2290]: E1213 14:32:28.843459 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.843479 kubelet[2290]: W1213 14:32:28.843473 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.843663 kubelet[2290]: E1213 14:32:28.843598 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.843770 kubelet[2290]: E1213 14:32:28.843755 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.843770 kubelet[2290]: W1213 14:32:28.843768 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.843877 kubelet[2290]: E1213 14:32:28.843854 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.844100 kubelet[2290]: E1213 14:32:28.844079 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.844183 kubelet[2290]: W1213 14:32:28.844155 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.844310 kubelet[2290]: E1213 14:32:28.844293 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.844425 kubelet[2290]: E1213 14:32:28.844409 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.844425 kubelet[2290]: W1213 14:32:28.844422 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.844533 kubelet[2290]: E1213 14:32:28.844508 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.844713 kubelet[2290]: E1213 14:32:28.844697 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.844713 kubelet[2290]: W1213 14:32:28.844710 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.844980 kubelet[2290]: E1213 14:32:28.844963 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.845088 kubelet[2290]: E1213 14:32:28.845068 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.845088 kubelet[2290]: W1213 14:32:28.845082 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.845188 kubelet[2290]: E1213 14:32:28.845178 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.845343 kubelet[2290]: E1213 14:32:28.845324 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.845343 kubelet[2290]: W1213 14:32:28.845338 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.845463 kubelet[2290]: E1213 14:32:28.845429 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.845674 kubelet[2290]: E1213 14:32:28.845652 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.845674 kubelet[2290]: W1213 14:32:28.845666 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.847074 kubelet[2290]: E1213 14:32:28.847056 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.847297 kubelet[2290]: E1213 14:32:28.847283 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.847377 kubelet[2290]: W1213 14:32:28.847299 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.847500 kubelet[2290]: E1213 14:32:28.847487 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.847571 kubelet[2290]: W1213 14:32:28.847501 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.847736 kubelet[2290]: E1213 14:32:28.847723 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.847736 kubelet[2290]: W1213 14:32:28.847737 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.847920 kubelet[2290]: E1213 14:32:28.847908 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.848053 kubelet[2290]: W1213 14:32:28.847993 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.848198 kubelet[2290]: E1213 14:32:28.848177 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.848198 kubelet[2290]: W1213 14:32:28.848191 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.848591 kubelet[2290]: E1213 14:32:28.848566 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.848591 kubelet[2290]: W1213 14:32:28.848582 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.848792 kubelet[2290]: E1213 14:32:28.848772 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.848888 kubelet[2290]: E1213 14:32:28.848878 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.849030 kubelet[2290]: E1213 14:32:28.848993 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.849030 kubelet[2290]: E1213 14:32:28.849015 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.849181 kubelet[2290]: E1213 14:32:28.849171 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.849345 kubelet[2290]: E1213 14:32:28.849269 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.849345 kubelet[2290]: W1213 14:32:28.849333 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.849440 kubelet[2290]: E1213 14:32:28.849348 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.850042 kubelet[2290]: E1213 14:32:28.850028 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.850147 kubelet[2290]: W1213 14:32:28.850135 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.850345 kubelet[2290]: E1213 14:32:28.849280 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.850481 kubelet[2290]: E1213 14:32:28.850469 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.850889 kubelet[2290]: E1213 14:32:28.850875 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.851068 kubelet[2290]: W1213 14:32:28.851052 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.851314 kubelet[2290]: E1213 14:32:28.851301 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.851726 kubelet[2290]: E1213 14:32:28.851713 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.851835 kubelet[2290]: W1213 14:32:28.851824 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.852227 kubelet[2290]: E1213 14:32:28.852214 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.852883 kubelet[2290]: E1213 14:32:28.852870 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.852985 kubelet[2290]: W1213 14:32:28.852973 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.853165 kubelet[2290]: E1213 14:32:28.853155 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.853416 kubelet[2290]: E1213 14:32:28.853407 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.853504 kubelet[2290]: W1213 14:32:28.853494 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.853895 kubelet[2290]: E1213 14:32:28.853884 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.854419 kubelet[2290]: E1213 14:32:28.854398 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.854521 kubelet[2290]: W1213 14:32:28.854507 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.855142 kubelet[2290]: E1213 14:32:28.855127 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.861182 kubelet[2290]: E1213 14:32:28.861156 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.861355 kubelet[2290]: W1213 14:32:28.861337 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.861556 kubelet[2290]: E1213 14:32:28.861539 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.867685 kubelet[2290]: E1213 14:32:28.867628 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.867853 kubelet[2290]: W1213 14:32:28.867839 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.867982 kubelet[2290]: E1213 14:32:28.867972 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.869219 kubelet[2290]: E1213 14:32:28.869196 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.869364 kubelet[2290]: W1213 14:32:28.869350 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.869470 kubelet[2290]: E1213 14:32:28.869458 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.880203 kubelet[2290]: E1213 14:32:28.880171 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.880395 kubelet[2290]: W1213 14:32:28.880379 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.880502 kubelet[2290]: E1213 14:32:28.880491 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.891562 kubelet[2290]: E1213 14:32:28.891455 2290 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:28.891562 kubelet[2290]: W1213 14:32:28.891473 2290 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:28.891562 kubelet[2290]: E1213 14:32:28.891497 2290 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:28.969455 env[1834]: time="2024-12-13T14:32:28.968700613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4f647,Uid:107c299f-32fc-413d-96e1-2cb26cb02b33,Namespace:calico-system,Attempt:0,}" Dec 13 14:32:28.969455 env[1834]: time="2024-12-13T14:32:28.969288956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ch2kv,Uid:77ed99be-de8d-4092-b637-98dd7edd2c81,Namespace:kube-system,Attempt:0,}" Dec 13 14:32:29.656015 kubelet[2290]: E1213 14:32:29.655838 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:29.663104 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount242750774.mount: Deactivated successfully. Dec 13 14:32:29.708163 env[1834]: time="2024-12-13T14:32:29.708103709Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.713849 env[1834]: time="2024-12-13T14:32:29.713786423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.715786 env[1834]: time="2024-12-13T14:32:29.715743263Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.719183 env[1834]: time="2024-12-13T14:32:29.719129633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.720658 env[1834]: time="2024-12-13T14:32:29.720591269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.722708 env[1834]: time="2024-12-13T14:32:29.722668884Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.724964 env[1834]: time="2024-12-13T14:32:29.724923234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.732971 env[1834]: time="2024-12-13T14:32:29.732912612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.789393 env[1834]: time="2024-12-13T14:32:29.789293810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:29.789546 env[1834]: time="2024-12-13T14:32:29.789425392Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:29.789546 env[1834]: time="2024-12-13T14:32:29.789459600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:29.789776 env[1834]: time="2024-12-13T14:32:29.789733505Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289 pid=2378 runtime=io.containerd.runc.v2 Dec 13 14:32:29.793711 env[1834]: time="2024-12-13T14:32:29.793455871Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:29.793956 env[1834]: time="2024-12-13T14:32:29.793919830Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:29.794076 env[1834]: time="2024-12-13T14:32:29.794051100Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:29.794659 env[1834]: time="2024-12-13T14:32:29.794598465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78e833bec7b7d4ec722b2b0e83495937fe7dce4d5e1d403b5efa76672f1c565f pid=2385 runtime=io.containerd.runc.v2 Dec 13 14:32:29.938739 env[1834]: time="2024-12-13T14:32:29.938260382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4f647,Uid:107c299f-32fc-413d-96e1-2cb26cb02b33,Namespace:calico-system,Attempt:0,} returns sandbox id \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\"" Dec 13 14:32:29.968347 env[1834]: time="2024-12-13T14:32:29.960840593Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:32:30.029157 env[1834]: time="2024-12-13T14:32:30.029110954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ch2kv,Uid:77ed99be-de8d-4092-b637-98dd7edd2c81,Namespace:kube-system,Attempt:0,} returns sandbox id \"78e833bec7b7d4ec722b2b0e83495937fe7dce4d5e1d403b5efa76672f1c565f\"" Dec 13 14:32:30.657086 kubelet[2290]: E1213 14:32:30.657043 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:30.886502 kubelet[2290]: E1213 14:32:30.886438 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:31.272481 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1913588009.mount: Deactivated successfully. Dec 13 14:32:31.480794 env[1834]: time="2024-12-13T14:32:31.480739878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:31.483756 env[1834]: time="2024-12-13T14:32:31.483711394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:31.486197 env[1834]: time="2024-12-13T14:32:31.486156901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:31.488189 env[1834]: time="2024-12-13T14:32:31.488149804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:31.488769 env[1834]: time="2024-12-13T14:32:31.488729351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:32:31.490582 env[1834]: time="2024-12-13T14:32:31.490547703Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:32:31.491771 env[1834]: time="2024-12-13T14:32:31.491737487Z" level=info msg="CreateContainer within sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:32:31.521314 env[1834]: time="2024-12-13T14:32:31.521205144Z" level=info msg="CreateContainer within sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\"" Dec 13 14:32:31.522363 env[1834]: time="2024-12-13T14:32:31.522328524Z" level=info msg="StartContainer for \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\"" Dec 13 14:32:31.661867 kubelet[2290]: E1213 14:32:31.658667 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:31.710816 env[1834]: time="2024-12-13T14:32:31.710700257Z" level=info msg="StartContainer for \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\" returns successfully" Dec 13 14:32:31.894776 env[1834]: time="2024-12-13T14:32:31.894718711Z" level=info msg="shim disconnected" id=d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807 Dec 13 14:32:31.895050 env[1834]: time="2024-12-13T14:32:31.894782158Z" level=warning msg="cleaning up after shim disconnected" id=d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807 namespace=k8s.io Dec 13 14:32:31.895050 env[1834]: time="2024-12-13T14:32:31.894795721Z" level=info msg="cleaning up dead shim" Dec 13 14:32:31.910017 env[1834]: time="2024-12-13T14:32:31.909973726Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:32:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2496 runtime=io.containerd.runc.v2\n" Dec 13 14:32:32.198573 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807-rootfs.mount: Deactivated successfully. Dec 13 14:32:32.659281 kubelet[2290]: E1213 14:32:32.658916 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:32.889670 kubelet[2290]: E1213 14:32:32.889214 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:33.577774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2498928844.mount: Deactivated successfully. Dec 13 14:32:33.660094 kubelet[2290]: E1213 14:32:33.660033 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:34.660883 kubelet[2290]: E1213 14:32:34.660842 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:34.683779 env[1834]: time="2024-12-13T14:32:34.683722935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:34.686934 env[1834]: time="2024-12-13T14:32:34.686891043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:34.689164 env[1834]: time="2024-12-13T14:32:34.689125367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:34.691491 env[1834]: time="2024-12-13T14:32:34.691450289Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:34.691884 env[1834]: time="2024-12-13T14:32:34.691846539Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:32:34.693860 env[1834]: time="2024-12-13T14:32:34.693831552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:32:34.694716 env[1834]: time="2024-12-13T14:32:34.694683951Z" level=info msg="CreateContainer within sandbox \"78e833bec7b7d4ec722b2b0e83495937fe7dce4d5e1d403b5efa76672f1c565f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:32:34.745115 env[1834]: time="2024-12-13T14:32:34.744819683Z" level=info msg="CreateContainer within sandbox \"78e833bec7b7d4ec722b2b0e83495937fe7dce4d5e1d403b5efa76672f1c565f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"28dc3ca68929895633847ba6bcb5f78ea469d3d409f5559766ea758d3c56f955\"" Dec 13 14:32:34.746785 env[1834]: time="2024-12-13T14:32:34.746683970Z" level=info msg="StartContainer for \"28dc3ca68929895633847ba6bcb5f78ea469d3d409f5559766ea758d3c56f955\"" Dec 13 14:32:34.847052 env[1834]: time="2024-12-13T14:32:34.846996643Z" level=info msg="StartContainer for \"28dc3ca68929895633847ba6bcb5f78ea469d3d409f5559766ea758d3c56f955\" returns successfully" Dec 13 14:32:34.891381 kubelet[2290]: E1213 14:32:34.891355 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:35.128654 kernel: kauditd_printk_skb: 70 callbacks suppressed Dec 13 14:32:35.128816 kernel: audit: type=1325 audit(1734100355.121:202): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.121000 audit[2571]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.121000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2703c200 a2=0 a3=7ffd2703c1ec items=0 ppid=2531 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.160473 kernel: audit: type=1300 audit(1734100355.121:202): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2703c200 a2=0 a3=7ffd2703c1ec items=0 ppid=2531 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.160653 kernel: audit: type=1327 audit(1734100355.121:202): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:32:35.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:32:35.125000 audit[2572]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2572 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.176728 kernel: audit: type=1325 audit(1734100355.125:203): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2572 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.125000 audit[2572]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd97e5d5a0 a2=0 a3=7ffd97e5d58c items=0 ppid=2531 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:32:35.200459 kernel: audit: type=1300 audit(1734100355.125:203): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd97e5d5a0 a2=0 a3=7ffd97e5d58c items=0 ppid=2531 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.200622 kernel: audit: type=1327 audit(1734100355.125:203): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:32:35.200798 kernel: audit: type=1325 audit(1734100355.130:204): table=nat:16 family=2 entries=1 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.130000 audit[2573]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.130000 audit[2573]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd221862b0 a2=0 a3=7ffd2218629c items=0 ppid=2531 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.226945 kernel: audit: type=1300 audit(1734100355.130:204): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd221862b0 a2=0 a3=7ffd2218629c items=0 ppid=2531 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.227112 kernel: audit: type=1327 audit(1734100355.130:204): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:32:35.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:32:35.138000 audit[2574]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.242335 kernel: audit: type=1325 audit(1734100355.138:205): table=filter:17 family=2 entries=1 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.138000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca5515f00 a2=0 a3=7ffca5515eec items=0 ppid=2531 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:32:35.139000 audit[2575]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2575 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.139000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda86a2150 a2=0 a3=7ffda86a213c items=0 ppid=2531 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:32:35.159000 audit[2576]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.159000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff924d2120 a2=0 a3=7fff924d210c items=0 ppid=2531 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:32:35.243000 audit[2577]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.243000 audit[2577]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffec4802430 a2=0 a3=7ffec480241c items=0 ppid=2531 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:32:35.254000 audit[2579]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.254000 audit[2579]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffee46ea20 a2=0 a3=7fffee46ea0c items=0 ppid=2531 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:32:35.273000 audit[2582]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.273000 audit[2582]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda12e5340 a2=0 a3=7ffda12e532c items=0 ppid=2531 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:32:35.278000 audit[2583]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.278000 audit[2583]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5568ca80 a2=0 a3=7ffc5568ca6c items=0 ppid=2531 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:32:35.298000 audit[2585]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.298000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1b443e70 a2=0 a3=7ffd1b443e5c items=0 ppid=2531 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:32:35.307000 audit[2586]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.307000 audit[2586]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe30807ae0 a2=0 a3=7ffe30807acc items=0 ppid=2531 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:32:35.316000 audit[2588]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.316000 audit[2588]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe3f4d2830 a2=0 a3=7ffe3f4d281c items=0 ppid=2531 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:32:35.334000 audit[2591]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.334000 audit[2591]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd3791e5b0 a2=0 a3=7ffd3791e59c items=0 ppid=2531 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:32:35.357000 audit[2592]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.357000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb3e42c30 a2=0 a3=7ffeb3e42c1c items=0 ppid=2531 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:32:35.388000 audit[2594]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.388000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd73cba100 a2=0 a3=7ffd73cba0ec items=0 ppid=2531 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:32:35.401000 audit[2595]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.401000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2315c490 a2=0 a3=7ffd2315c47c items=0 ppid=2531 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:32:35.421000 audit[2597]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.421000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf8a8d820 a2=0 a3=7ffcf8a8d80c items=0 ppid=2531 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:32:35.431000 audit[2600]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.431000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1c660b90 a2=0 a3=7ffe1c660b7c items=0 ppid=2531 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:32:35.436000 audit[2603]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.436000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff009627c0 a2=0 a3=7fff009627ac items=0 ppid=2531 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:32:35.438000 audit[2604]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.438000 audit[2604]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc803af6b0 a2=0 a3=7ffc803af69c items=0 ppid=2531 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:32:35.441000 audit[2606]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.441000 audit[2606]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5edc1ac0 a2=0 a3=7ffc5edc1aac items=0 ppid=2531 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:35.479000 audit[2611]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2611 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.479000 audit[2611]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd112a4c10 a2=0 a3=7ffd112a4bfc items=0 ppid=2531 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:35.481000 audit[2612]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.481000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea21d38d0 a2=0 a3=7ffea21d38bc items=0 ppid=2531 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:32:35.486000 audit[2614]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:35.486000 audit[2614]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd7a973bd0 a2=0 a3=7ffd7a973bbc items=0 ppid=2531 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:32:35.534000 audit[2620]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=2620 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:35.534000 audit[2620]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2eb72080 a2=0 a3=7fff2eb7206c items=0 ppid=2531 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:35.596000 audit[2620]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2620 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:35.596000 audit[2620]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7fff2eb72080 a2=0 a3=7fff2eb7206c items=0 ppid=2531 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:35.603000 audit[2626]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.603000 audit[2626]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc0c057cb0 a2=0 a3=7ffc0c057c9c items=0 ppid=2531 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:32:35.613000 audit[2628]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.613000 audit[2628]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe19200d00 a2=0 a3=7ffe19200cec items=0 ppid=2531 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.613000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:32:35.633000 audit[2631]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.633000 audit[2631]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffc7e537b0 a2=0 a3=7fffc7e5379c items=0 ppid=2531 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:32:35.638000 audit[2632]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.638000 audit[2632]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffb037600 a2=0 a3=7ffffb0375ec items=0 ppid=2531 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:32:35.649000 audit[2634]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.649000 audit[2634]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc5d102b0 a2=0 a3=7ffcc5d1029c items=0 ppid=2531 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:32:35.658000 audit[2635]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.658000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4fbf93d0 a2=0 a3=7ffd4fbf93bc items=0 ppid=2531 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:32:35.662742 kubelet[2290]: E1213 14:32:35.662663 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:35.672000 audit[2637]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.672000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc57cf67e0 a2=0 a3=7ffc57cf67cc items=0 ppid=2531 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:32:35.714000 audit[2640]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.714000 audit[2640]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe1235eac0 a2=0 a3=7ffe1235eaac items=0 ppid=2531 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:32:35.719000 audit[2641]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.719000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf962e760 a2=0 a3=7ffdf962e74c items=0 ppid=2531 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:32:35.726000 audit[2643]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.726000 audit[2643]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff23846cd0 a2=0 a3=7fff23846cbc items=0 ppid=2531 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:32:35.727000 audit[2644]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2644 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.727000 audit[2644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2eddcbf0 a2=0 a3=7ffc2eddcbdc items=0 ppid=2531 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:32:35.739000 audit[2646]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.739000 audit[2646]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecf130bb0 a2=0 a3=7ffecf130b9c items=0 ppid=2531 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:32:35.747000 audit[2649]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.747000 audit[2649]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3a6298a0 a2=0 a3=7ffd3a62988c items=0 ppid=2531 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:32:35.756000 audit[2652]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.756000 audit[2652]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6b157e20 a2=0 a3=7ffc6b157e0c items=0 ppid=2531 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:32:35.760000 audit[2653]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2653 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.760000 audit[2653]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7303e790 a2=0 a3=7ffc7303e77c items=0 ppid=2531 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:32:35.768000 audit[2655]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.768000 audit[2655]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd37392f10 a2=0 a3=7ffd37392efc items=0 ppid=2531 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:35.775000 audit[2658]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.775000 audit[2658]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd7fb3add0 a2=0 a3=7ffd7fb3adbc items=0 ppid=2531 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:35.780000 audit[2659]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.780000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe871615e0 a2=0 a3=7ffe871615cc items=0 ppid=2531 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:32:35.784000 audit[2661]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.784000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcdee30d90 a2=0 a3=7ffcdee30d7c items=0 ppid=2531 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:32:35.787000 audit[2662]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2662 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.787000 audit[2662]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff423e86a0 a2=0 a3=7fff423e868c items=0 ppid=2531 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:32:35.791000 audit[2664]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.791000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc52d6a6b0 a2=0 a3=7ffc52d6a69c items=0 ppid=2531 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:35.811000 audit[2667]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:35.811000 audit[2667]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea237e5c0 a2=0 a3=7ffea237e5ac items=0 ppid=2531 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:35.825000 audit[2669]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:32:35.825000 audit[2669]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe48c865f0 a2=0 a3=7ffe48c865dc items=0 ppid=2531 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.825000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:35.827000 audit[2669]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:32:35.827000 audit[2669]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe48c865f0 a2=0 a3=7ffe48c865dc items=0 ppid=2531 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:35.827000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:36.663766 kubelet[2290]: E1213 14:32:36.663690 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:36.891978 kubelet[2290]: E1213 14:32:36.891936 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:37.664271 kubelet[2290]: E1213 14:32:37.664213 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:38.665203 kubelet[2290]: E1213 14:32:38.665137 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:38.888840 kubelet[2290]: E1213 14:32:38.887107 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:39.669527 kubelet[2290]: E1213 14:32:39.669457 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:40.669948 kubelet[2290]: E1213 14:32:40.669847 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:40.892102 kubelet[2290]: E1213 14:32:40.887668 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:41.407266 env[1834]: time="2024-12-13T14:32:41.407171069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:41.411276 env[1834]: time="2024-12-13T14:32:41.411230598Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:41.423567 env[1834]: time="2024-12-13T14:32:41.423405206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:41.431680 env[1834]: time="2024-12-13T14:32:41.431486039Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:41.449250 env[1834]: time="2024-12-13T14:32:41.449198303Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:32:41.458109 env[1834]: time="2024-12-13T14:32:41.457911015Z" level=info msg="CreateContainer within sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:32:41.493785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2359586386.mount: Deactivated successfully. Dec 13 14:32:41.509027 env[1834]: time="2024-12-13T14:32:41.508754839Z" level=info msg="CreateContainer within sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\"" Dec 13 14:32:41.511568 env[1834]: time="2024-12-13T14:32:41.511516837Z" level=info msg="StartContainer for \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\"" Dec 13 14:32:41.675311 kubelet[2290]: E1213 14:32:41.670749 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:41.793276 env[1834]: time="2024-12-13T14:32:41.793214553Z" level=info msg="StartContainer for \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\" returns successfully" Dec 13 14:32:42.601741 systemd-timesyncd[1762]: Contacted time server 83.147.242.172:123 (2.flatcar.pool.ntp.org). Dec 13 14:32:42.602492 systemd-timesyncd[1762]: Initial clock synchronization to Fri 2024-12-13 14:32:42.601432 UTC. Dec 13 14:32:42.605224 systemd-resolved[1761]: Clock change detected. Flushing caches. Dec 13 14:32:42.780486 kubelet[2290]: I1213 14:32:42.780372 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-ch2kv" podStartSLOduration=11.119413185 podStartE2EDuration="15.780244337s" podCreationTimestamp="2024-12-13 14:32:27 +0000 UTC" firstStartedPulling="2024-12-13 14:32:30.031927981 +0000 UTC m=+3.886637077" lastFinishedPulling="2024-12-13 14:32:34.692759122 +0000 UTC m=+8.547468229" observedRunningTime="2024-12-13 14:32:35.003600145 +0000 UTC m=+8.858309250" watchObservedRunningTime="2024-12-13 14:32:42.780244337 +0000 UTC m=+15.917427728" Dec 13 14:32:43.200894 systemd[1]: run-containerd-runc-k8s.io-9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201-runc.RihN5Z.mount: Deactivated successfully. Dec 13 14:32:43.389563 kubelet[2290]: E1213 14:32:43.389520 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:43.605850 kubelet[2290]: E1213 14:32:43.604902 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:43.607556 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:32:43.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:43.610512 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 14:32:43.610601 kernel: audit: type=1131 audit(1734100363.606:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:44.195203 env[1834]: time="2024-12-13T14:32:44.194424422Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:32:44.220354 kubelet[2290]: I1213 14:32:44.220322 2290 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:32:44.254968 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201-rootfs.mount: Deactivated successfully. Dec 13 14:32:44.326069 env[1834]: time="2024-12-13T14:32:44.326011650Z" level=info msg="shim disconnected" id=9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201 Dec 13 14:32:44.326069 env[1834]: time="2024-12-13T14:32:44.326065979Z" level=warning msg="cleaning up after shim disconnected" id=9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201 namespace=k8s.io Dec 13 14:32:44.326069 env[1834]: time="2024-12-13T14:32:44.326080423Z" level=info msg="cleaning up dead shim" Dec 13 14:32:44.349479 env[1834]: time="2024-12-13T14:32:44.349424630Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:32:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2725 runtime=io.containerd.runc.v2\n" Dec 13 14:32:44.390377 kubelet[2290]: E1213 14:32:44.390334 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:44.744211 env[1834]: time="2024-12-13T14:32:44.744110810Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:32:45.390964 kubelet[2290]: E1213 14:32:45.390911 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:45.616276 env[1834]: time="2024-12-13T14:32:45.616230938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9pd9n,Uid:4f09de66-c27e-4908-9687-1007fc5643ee,Namespace:calico-system,Attempt:0,}" Dec 13 14:32:45.861974 env[1834]: time="2024-12-13T14:32:45.861285032Z" level=error msg="Failed to destroy network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:45.867743 env[1834]: time="2024-12-13T14:32:45.867561686Z" level=error msg="encountered an error cleaning up failed sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:45.868020 env[1834]: time="2024-12-13T14:32:45.867963113Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9pd9n,Uid:4f09de66-c27e-4908-9687-1007fc5643ee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:45.869467 kubelet[2290]: E1213 14:32:45.869013 2290 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:45.869467 kubelet[2290]: E1213 14:32:45.869091 2290 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:45.869467 kubelet[2290]: E1213 14:32:45.869118 2290 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9pd9n" Dec 13 14:32:45.871553 kubelet[2290]: E1213 14:32:45.869204 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9pd9n_calico-system(4f09de66-c27e-4908-9687-1007fc5643ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9pd9n_calico-system(4f09de66-c27e-4908-9687-1007fc5643ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:45.876478 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c-shm.mount: Deactivated successfully. Dec 13 14:32:46.391592 kubelet[2290]: E1213 14:32:46.391429 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:46.747962 kubelet[2290]: I1213 14:32:46.746304 2290 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:32:46.748694 env[1834]: time="2024-12-13T14:32:46.748648145Z" level=info msg="StopPodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\"" Dec 13 14:32:46.868703 env[1834]: time="2024-12-13T14:32:46.868630192Z" level=error msg="StopPodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" failed" error="failed to destroy network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:46.869597 kubelet[2290]: E1213 14:32:46.869332 2290 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:32:46.869597 kubelet[2290]: E1213 14:32:46.869432 2290 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c"} Dec 13 14:32:46.869597 kubelet[2290]: E1213 14:32:46.869516 2290 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f09de66-c27e-4908-9687-1007fc5643ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:32:46.869597 kubelet[2290]: E1213 14:32:46.869571 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f09de66-c27e-4908-9687-1007fc5643ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9pd9n" podUID="4f09de66-c27e-4908-9687-1007fc5643ee" Dec 13 14:32:47.370246 kubelet[2290]: E1213 14:32:47.370195 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:47.392384 kubelet[2290]: E1213 14:32:47.392327 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:48.264023 kubelet[2290]: I1213 14:32:48.263508 2290 topology_manager.go:215] "Topology Admit Handler" podUID="c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b" podNamespace="default" podName="nginx-deployment-6d5f899847-nwvlw" Dec 13 14:32:48.347669 kubelet[2290]: I1213 14:32:48.347576 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m85wl\" (UniqueName: \"kubernetes.io/projected/c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b-kube-api-access-m85wl\") pod \"nginx-deployment-6d5f899847-nwvlw\" (UID: \"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b\") " pod="default/nginx-deployment-6d5f899847-nwvlw" Dec 13 14:32:48.392711 kubelet[2290]: E1213 14:32:48.392675 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:48.572675 env[1834]: time="2024-12-13T14:32:48.572035138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-nwvlw,Uid:c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b,Namespace:default,Attempt:0,}" Dec 13 14:32:48.776014 env[1834]: time="2024-12-13T14:32:48.775951692Z" level=error msg="Failed to destroy network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:48.783914 env[1834]: time="2024-12-13T14:32:48.776362099Z" level=error msg="encountered an error cleaning up failed sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:48.783914 env[1834]: time="2024-12-13T14:32:48.776423162Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-nwvlw,Uid:c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:48.779138 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac-shm.mount: Deactivated successfully. Dec 13 14:32:48.784900 kubelet[2290]: E1213 14:32:48.776749 2290 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:48.784900 kubelet[2290]: E1213 14:32:48.776818 2290 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-nwvlw" Dec 13 14:32:48.784900 kubelet[2290]: E1213 14:32:48.776847 2290 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-nwvlw" Dec 13 14:32:48.785075 kubelet[2290]: E1213 14:32:48.776915 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-nwvlw_default(c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-nwvlw_default(c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-nwvlw" podUID="c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b" Dec 13 14:32:49.394414 kubelet[2290]: E1213 14:32:49.394369 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:49.758355 kubelet[2290]: I1213 14:32:49.758317 2290 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:32:49.760407 env[1834]: time="2024-12-13T14:32:49.760357971Z" level=info msg="StopPodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\"" Dec 13 14:32:49.839966 env[1834]: time="2024-12-13T14:32:49.839902317Z" level=error msg="StopPodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" failed" error="failed to destroy network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:32:49.840834 kubelet[2290]: E1213 14:32:49.840521 2290 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:32:49.840834 kubelet[2290]: E1213 14:32:49.840574 2290 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac"} Dec 13 14:32:49.840834 kubelet[2290]: E1213 14:32:49.840717 2290 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:32:49.840834 kubelet[2290]: E1213 14:32:49.840796 2290 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-nwvlw" podUID="c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b" Dec 13 14:32:50.395601 kubelet[2290]: E1213 14:32:50.395555 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:51.395926 kubelet[2290]: E1213 14:32:51.395882 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:52.396606 kubelet[2290]: E1213 14:32:52.396532 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:53.401457 kubelet[2290]: E1213 14:32:53.401386 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:53.700208 amazon-ssm-agent[1813]: 2024-12-13 14:32:53 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:32:54.249549 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount984830048.mount: Deactivated successfully. Dec 13 14:32:54.307273 env[1834]: time="2024-12-13T14:32:54.307222706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:54.310521 env[1834]: time="2024-12-13T14:32:54.310466123Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:54.314378 env[1834]: time="2024-12-13T14:32:54.314316323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:54.316708 env[1834]: time="2024-12-13T14:32:54.316651064Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:54.317367 env[1834]: time="2024-12-13T14:32:54.317322975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:32:54.342541 env[1834]: time="2024-12-13T14:32:54.342486398Z" level=info msg="CreateContainer within sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:32:54.368502 env[1834]: time="2024-12-13T14:32:54.368451292Z" level=info msg="CreateContainer within sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\"" Dec 13 14:32:54.369274 env[1834]: time="2024-12-13T14:32:54.369240039Z" level=info msg="StartContainer for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\"" Dec 13 14:32:54.401729 kubelet[2290]: E1213 14:32:54.401671 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:54.495000 audit[2872]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:54.495000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffec710cf0 a2=0 a3=7fffec710cdc items=0 ppid=2531 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:54.507875 kernel: audit: type=1325 audit(1734100374.495:254): table=filter:65 family=2 entries=16 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:54.508029 kernel: audit: type=1300 audit(1734100374.495:254): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffec710cf0 a2=0 a3=7fffec710cdc items=0 ppid=2531 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:54.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:54.508000 audit[2872]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:54.517607 kernel: audit: type=1327 audit(1734100374.495:254): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:54.517718 kernel: audit: type=1325 audit(1734100374.508:255): table=nat:66 family=2 entries=14 op=nft_register_rule pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:54.508000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffec710cf0 a2=0 a3=0 items=0 ppid=2531 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:54.526672 kernel: audit: type=1300 audit(1734100374.508:255): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffec710cf0 a2=0 a3=0 items=0 ppid=2531 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:54.527022 kernel: audit: type=1327 audit(1734100374.508:255): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:54.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:54.533566 env[1834]: time="2024-12-13T14:32:54.533366531Z" level=info msg="StartContainer for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" returns successfully" Dec 13 14:32:54.715875 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:32:54.716039 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:32:55.402186 kubelet[2290]: E1213 14:32:55.402112 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:55.812018 systemd[1]: run-containerd-runc-k8s.io-e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6-runc.ITiboX.mount: Deactivated successfully. Dec 13 14:32:56.403028 kubelet[2290]: E1213 14:32:56.402982 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:56.526000 audit[3000]: AVC avc: denied { write } for pid=3000 comm="tee" name="fd" dev="proc" ino=19814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.526000 audit[2998]: AVC avc: denied { write } for pid=2998 comm="tee" name="fd" dev="proc" ino=20865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.536156 kernel: audit: type=1400 audit(1734100376.526:256): avc: denied { write } for pid=3000 comm="tee" name="fd" dev="proc" ino=19814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.536312 kernel: audit: type=1400 audit(1734100376.526:257): avc: denied { write } for pid=2998 comm="tee" name="fd" dev="proc" ino=20865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.526000 audit[2998]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc336c7a20 a2=241 a3=1b6 items=1 ppid=2970 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.526000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:32:56.581589 kernel: audit: type=1300 audit(1734100376.526:257): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc336c7a20 a2=241 a3=1b6 items=1 ppid=2970 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.582432 kernel: audit: type=1307 audit(1734100376.526:257): cwd="/etc/service/enabled/bird/log" Dec 13 14:32:56.526000 audit: PATH item=0 name="/dev/fd/63" inode=20858 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.526000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:56.544000 audit[2995]: AVC avc: denied { write } for pid=2995 comm="tee" name="fd" dev="proc" ino=20874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.544000 audit[2995]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd26d97a1f a2=241 a3=1b6 items=1 ppid=2966 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.544000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:32:56.544000 audit: PATH item=0 name="/dev/fd/63" inode=20855 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.544000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:56.592000 audit[3003]: AVC avc: denied { write } for pid=3003 comm="tee" name="fd" dev="proc" ino=19819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.592000 audit[3003]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd3adaa0f a2=241 a3=1b6 items=1 ppid=2977 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.592000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:32:56.592000 audit: PATH item=0 name="/dev/fd/63" inode=19809 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:56.526000 audit[3000]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc114cca1f a2=241 a3=1b6 items=1 ppid=2967 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.526000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:32:56.526000 audit: PATH item=0 name="/dev/fd/63" inode=19806 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.526000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:56.606000 audit[3028]: AVC avc: denied { write } for pid=3028 comm="tee" name="fd" dev="proc" ino=19825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.607000 audit[3012]: AVC avc: denied { write } for pid=3012 comm="tee" name="fd" dev="proc" ino=20880 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.607000 audit[3012]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb8cbfa1f a2=241 a3=1b6 items=1 ppid=2974 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.607000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:32:56.607000 audit: PATH item=0 name="/dev/fd/63" inode=20871 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:56.611000 audit[3029]: AVC avc: denied { write } for pid=3029 comm="tee" name="fd" dev="proc" ino=19829 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:56.606000 audit[3028]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde42c1a10 a2=241 a3=1b6 items=1 ppid=2972 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.606000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:32:56.606000 audit: PATH item=0 name="/dev/fd/63" inode=20876 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.606000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:56.611000 audit[3029]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4e796a21 a2=241 a3=1b6 items=1 ppid=2983 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.611000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:32:56.611000 audit: PATH item=0 name="/dev/fd/63" inode=19816 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:56.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.013000 audit: BPF prog-id=10 op=LOAD Dec 13 14:32:57.013000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb4e2a360 a2=98 a3=3 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.013000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.013000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit: BPF prog-id=11 op=LOAD Dec 13 14:32:57.014000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb4e2a140 a2=74 a3=540051 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.014000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.014000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.014000 audit: BPF prog-id=12 op=LOAD Dec 13 14:32:57.014000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb4e2a170 a2=94 a3=2 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.014000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.014000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.202000 audit: BPF prog-id=13 op=LOAD Dec 13 14:32:57.202000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb4e2a030 a2=40 a3=1 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.205000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:32:57.205000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.205000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb4e2a100 a2=50 a3=7ffeb4e2a1e0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4e2a040 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4e2a070 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4e29f80 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4e2a090 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4e2a070 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4e2a060 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4e2a090 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4e2a070 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4e2a090 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4e2a060 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.241000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.241000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4e2a0d0 a2=28 a3=0 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb4e29e80 a2=50 a3=1 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit: BPF prog-id=14 op=LOAD Dec 13 14:32:57.242000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb4e29e80 a2=94 a3=5 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.242000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb4e29f30 a2=50 a3=1 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb4e2a050 a2=4 a3=38 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:57.242000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb4e2a0a0 a2=94 a3=6 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.242000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:57.242000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb4e29850 a2=94 a3=83 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.243000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:57.243000 audit[3072]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb4e29850 a2=94 a3=83 items=0 ppid=2968 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit: BPF prog-id=15 op=LOAD Dec 13 14:32:57.259000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb2d63f0 a2=98 a3=1999999999999999 items=0 ppid=2968 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.259000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:57.259000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit: BPF prog-id=16 op=LOAD Dec 13 14:32:57.259000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb2d62d0 a2=74 a3=ffff items=0 ppid=2968 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.259000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:57.259000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.259000 audit: BPF prog-id=17 op=LOAD Dec 13 14:32:57.259000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdb2d6310 a2=40 a3=7ffcdb2d64f0 items=0 ppid=2968 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.259000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:57.259000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:32:57.327245 systemd-networkd[1513]: vxlan.calico: Link UP Dec 13 14:32:57.327256 systemd-networkd[1513]: vxlan.calico: Gained carrier Dec 13 14:32:57.331172 (udev-worker)[2888]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:32:57.404395 kubelet[2290]: E1213 14:32:57.404204 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit: BPF prog-id=18 op=LOAD Dec 13 14:32:57.446000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd71c2a750 a2=98 a3=ffffffff items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.446000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit: BPF prog-id=19 op=LOAD Dec 13 14:32:57.446000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd71c2a560 a2=74 a3=540051 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.446000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.446000 audit: BPF prog-id=20 op=LOAD Dec 13 14:32:57.446000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd71c2a590 a2=94 a3=2 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd71c2a460 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd71c2a490 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd71c2a3a0 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd71c2a4b0 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd71c2a490 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd71c2a480 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd71c2a4b0 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.447000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.447000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd71c2a490 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd71c2a4b0 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd71c2a480 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd71c2a4f0 a2=28 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.455000 audit: BPF prog-id=21 op=LOAD Dec 13 14:32:57.455000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd71c2a360 a2=40 a3=0 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.455000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.455000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd71c2a350 a2=50 a3=2800 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.458000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd71c2a350 a2=50 a3=2800 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.458000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit: BPF prog-id=22 op=LOAD Dec 13 14:32:57.458000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd71c29b70 a2=94 a3=2 items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.458000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.458000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.458000 audit: BPF prog-id=23 op=LOAD Dec 13 14:32:57.458000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd71c29c70 a2=94 a3=2d items=0 ppid=2968 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.458000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit: BPF prog-id=24 op=LOAD Dec 13 14:32:57.470000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe701ce390 a2=98 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.470000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit: BPF prog-id=25 op=LOAD Dec 13 14:32:57.470000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe701ce170 a2=74 a3=540051 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.470000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.470000 audit: BPF prog-id=26 op=LOAD Dec 13 14:32:57.470000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe701ce1a0 a2=94 a3=2 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.470000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:32:57.506000 audit[3111]: NETFILTER_CFG table=filter:67 family=2 entries=16 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:57.506000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd7fa7a7b0 a2=0 a3=7ffd7fa7a79c items=0 ppid=2531 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:57.514000 audit[3111]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:57.514000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd7fa7a7b0 a2=0 a3=0 items=0 ppid=2531 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:57.514331 (udev-worker)[2889]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit: BPF prog-id=27 op=LOAD Dec 13 14:32:57.689000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe701ce060 a2=40 a3=1 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.689000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:32:57.689000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.689000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe701ce130 a2=50 a3=7ffe701ce210 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe701ce070 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe701ce0a0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe701cdfb0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe701ce0c0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe701ce0a0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe701ce090 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe701ce0c0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe701ce0a0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe701ce0c0 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe701ce090 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.701000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.701000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe701ce100 a2=28 a3=0 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe701cdeb0 a2=50 a3=1 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit: BPF prog-id=28 op=LOAD Dec 13 14:32:57.703000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe701cdeb0 a2=94 a3=5 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.703000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe701cdf60 a2=50 a3=1 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe701ce080 a2=4 a3=38 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.703000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:57.703000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe701ce0d0 a2=94 a3=6 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:57.704000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe701cd880 a2=94 a3=83 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { confidentiality } for pid=3107 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:57.704000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe701cd880 a2=94 a3=83 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.704000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.704000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe701cf2c0 a2=10 a3=f1f00800 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.705000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.705000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe701cf160 a2=10 a3=3 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.705000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.705000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe701cf100 a2=10 a3=3 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.705000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.705000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe701cf100 a2=10 a3=7 items=0 ppid=2968 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:57.713000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:32:57.787000 audit[3138]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:57.787000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffff76ac270 a2=0 a3=7ffff76ac25c items=0 ppid=2968 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:57.797000 audit[3137]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:57.797000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff94a81fd0 a2=0 a3=7fff94a81fbc items=0 ppid=2968 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.797000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:57.804000 audit[3139]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:57.804000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe0cf3c490 a2=0 a3=7ffe0cf3c47c items=0 ppid=2968 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.804000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:57.808000 audit[3136]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:57.808000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd482d2ec0 a2=0 a3=7ffd482d2eac items=0 ppid=2968 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.808000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:57.817983 update_engine[1829]: I1213 14:32:57.817226 1829 update_attempter.cc:509] Updating boot flags... Dec 13 14:32:58.404640 kubelet[2290]: E1213 14:32:58.404447 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:59.095342 systemd-networkd[1513]: vxlan.calico: Gained IPv6LL Dec 13 14:32:59.405925 kubelet[2290]: E1213 14:32:59.405815 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:59.605999 env[1834]: time="2024-12-13T14:32:59.605519394Z" level=info msg="StopPodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\"" Dec 13 14:32:59.776961 kubelet[2290]: I1213 14:32:59.776476 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4f647" podStartSLOduration=9.11805381 podStartE2EDuration="32.776430665s" podCreationTimestamp="2024-12-13 14:32:27 +0000 UTC" firstStartedPulling="2024-12-13 14:32:29.941786748 +0000 UTC m=+3.796495856" lastFinishedPulling="2024-12-13 14:32:54.317689322 +0000 UTC m=+27.454872711" observedRunningTime="2024-12-13 14:32:54.939822188 +0000 UTC m=+28.077005585" watchObservedRunningTime="2024-12-13 14:32:59.776430665 +0000 UTC m=+32.913614065" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:32:59.777 [INFO][3256] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:32:59.777 [INFO][3256] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" iface="eth0" netns="/var/run/netns/cni-7d4f60ac-bb6f-4c5a-20f3-2dcf86a83785" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:32:59.778 [INFO][3256] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" iface="eth0" netns="/var/run/netns/cni-7d4f60ac-bb6f-4c5a-20f3-2dcf86a83785" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:32:59.780 [INFO][3256] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" iface="eth0" netns="/var/run/netns/cni-7d4f60ac-bb6f-4c5a-20f3-2dcf86a83785" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:32:59.780 [INFO][3256] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:32:59.780 [INFO][3256] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.085 [INFO][3262] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.085 [INFO][3262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.085 [INFO][3262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.110 [WARNING][3262] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.110 [INFO][3262] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.113 [INFO][3262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:00.119299 env[1834]: 2024-12-13 14:33:00.115 [INFO][3256] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:00.131607 systemd[1]: run-netns-cni\x2d7d4f60ac\x2dbb6f\x2d4c5a\x2d20f3\x2d2dcf86a83785.mount: Deactivated successfully. Dec 13 14:33:00.134339 env[1834]: time="2024-12-13T14:33:00.134278113Z" level=info msg="TearDown network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" successfully" Dec 13 14:33:00.134551 env[1834]: time="2024-12-13T14:33:00.134526482Z" level=info msg="StopPodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" returns successfully" Dec 13 14:33:00.135438 env[1834]: time="2024-12-13T14:33:00.135404309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9pd9n,Uid:4f09de66-c27e-4908-9687-1007fc5643ee,Namespace:calico-system,Attempt:1,}" Dec 13 14:33:00.406345 kubelet[2290]: E1213 14:33:00.406306 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:00.523831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:00.524558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calice33f1662d7: link becomes ready Dec 13 14:33:00.558385 kernel: kauditd_printk_skb: 517 callbacks suppressed Dec 13 14:33:00.561155 kernel: audit: type=1325 audit(1734100380.548:360): table=filter:73 family=2 entries=16 op=nft_register_rule pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:00.566178 kernel: audit: type=1300 audit(1734100380.548:360): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc033a6b40 a2=0 a3=7ffc033a6b2c items=0 ppid=2531 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:00.548000 audit[3290]: NETFILTER_CFG table=filter:73 family=2 entries=16 op=nft_register_rule pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:00.548000 audit[3290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc033a6b40 a2=0 a3=7ffc033a6b2c items=0 ppid=2531 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:00.616587 kernel: audit: type=1327 audit(1734100380.548:360): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:00.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:00.538034 systemd-networkd[1513]: calice33f1662d7: Link UP Dec 13 14:33:00.611000 audit[3290]: NETFILTER_CFG table=nat:74 family=2 entries=14 op=nft_register_rule pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:00.611000 audit[3290]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc033a6b40 a2=0 a3=0 items=0 ppid=2531 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:00.538284 systemd-networkd[1513]: calice33f1662d7: Gained carrier Dec 13 14:33:00.543002 (udev-worker)[3116]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:33:00.654405 kernel: audit: type=1325 audit(1734100380.611:361): table=nat:74 family=2 entries=14 op=nft_register_rule pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:00.661060 kernel: audit: type=1300 audit(1734100380.611:361): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc033a6b40 a2=0 a3=0 items=0 ppid=2531 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:00.661149 kernel: audit: type=1327 audit(1734100380.611:361): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:00.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:00.672000 audit[3294]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:00.680646 kernel: audit: type=1325 audit(1734100380.672:362): table=filter:75 family=2 entries=34 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.232 [INFO][3268] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.211-k8s-csi--node--driver--9pd9n-eth0 csi-node-driver- calico-system 4f09de66-c27e-4908-9687-1007fc5643ee 1033 0 2024-12-13 14:32:27 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.21.211 csi-node-driver-9pd9n eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calice33f1662d7 [] []}} ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.232 [INFO][3268] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.315 [INFO][3280] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" HandleID="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.367 [INFO][3280] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" HandleID="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318960), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.21.211", "pod":"csi-node-driver-9pd9n", "timestamp":"2024-12-13 14:33:00.31505392 +0000 UTC"}, Hostname:"172.31.21.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.368 [INFO][3280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.369 [INFO][3280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.370 [INFO][3280] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.211' Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.377 [INFO][3280] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.392 [INFO][3280] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.405 [INFO][3280] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.410 [INFO][3280] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.421 [INFO][3280] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.421 [INFO][3280] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.425 [INFO][3280] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.440 [INFO][3280] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.467 [INFO][3280] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.65/26] block=192.168.113.64/26 handle="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.468 [INFO][3280] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.65/26] handle="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" host="172.31.21.211" Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.468 [INFO][3280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:00.681289 env[1834]: 2024-12-13 14:33:00.468 [INFO][3280] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.65/26] IPv6=[] ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" HandleID="k8s-pod-network.b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.672000 audit[3294]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff990f1d70 a2=0 a3=7fff990f1d5c items=0 ppid=2968 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:00.690810 env[1834]: 2024-12-13 14:33:00.492 [INFO][3268] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-csi--node--driver--9pd9n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f09de66-c27e-4908-9687-1007fc5643ee", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"", Pod:"csi-node-driver-9pd9n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calice33f1662d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:00.690810 env[1834]: 2024-12-13 14:33:00.496 [INFO][3268] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.65/32] ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.690810 env[1834]: 2024-12-13 14:33:00.496 [INFO][3268] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calice33f1662d7 ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.690810 env[1834]: 2024-12-13 14:33:00.535 [INFO][3268] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.690810 env[1834]: 2024-12-13 14:33:00.554 [INFO][3268] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-csi--node--driver--9pd9n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f09de66-c27e-4908-9687-1007fc5643ee", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b", Pod:"csi-node-driver-9pd9n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calice33f1662d7", MAC:"e6:92:ba:e4:b5:d2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:00.690810 env[1834]: 2024-12-13 14:33:00.673 [INFO][3268] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b" Namespace="calico-system" Pod="csi-node-driver-9pd9n" WorkloadEndpoint="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:00.691453 kernel: audit: type=1300 audit(1734100380.672:362): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff990f1d70 a2=0 a3=7fff990f1d5c items=0 ppid=2968 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:00.672000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:00.697191 kernel: audit: type=1327 audit(1734100380.672:362): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:00.706760 env[1834]: time="2024-12-13T14:33:00.706669757Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:00.706760 env[1834]: time="2024-12-13T14:33:00.706724007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:00.707106 env[1834]: time="2024-12-13T14:33:00.706738859Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:00.707247 env[1834]: time="2024-12-13T14:33:00.707154116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b pid=3312 runtime=io.containerd.runc.v2 Dec 13 14:33:00.860386 env[1834]: time="2024-12-13T14:33:00.859834889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9pd9n,Uid:4f09de66-c27e-4908-9687-1007fc5643ee,Namespace:calico-system,Attempt:1,} returns sandbox id \"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b\"" Dec 13 14:33:00.867693 env[1834]: time="2024-12-13T14:33:00.867657208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:33:01.407343 kubelet[2290]: E1213 14:33:01.407288 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:01.847486 systemd-networkd[1513]: calice33f1662d7: Gained IPv6LL Dec 13 14:33:02.407579 kubelet[2290]: E1213 14:33:02.407514 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:02.608200 env[1834]: time="2024-12-13T14:33:02.608140253Z" level=info msg="StopPodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\"" Dec 13 14:33:02.928000 audit[3379]: NETFILTER_CFG table=filter:76 family=2 entries=15 op=nft_register_rule pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:02.928000 audit[3379]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffed2ab72b0 a2=0 a3=7ffed2ab729c items=0 ppid=2531 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.940371 kernel: audit: type=1325 audit(1734100382.928:363): table=filter:76 family=2 entries=15 op=nft_register_rule pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:02.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:02.941000 audit[3379]: NETFILTER_CFG table=nat:77 family=2 entries=21 op=nft_register_chain pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:02.941000 audit[3379]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffed2ab72b0 a2=0 a3=7ffed2ab729c items=0 ppid=2531 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.941000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:02.878 [INFO][3361] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:02.878 [INFO][3361] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" iface="eth0" netns="/var/run/netns/cni-c630af34-51ad-0a09-43f2-939cc354cdd9" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:02.878 [INFO][3361] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" iface="eth0" netns="/var/run/netns/cni-c630af34-51ad-0a09-43f2-939cc354cdd9" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:02.879 [INFO][3361] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" iface="eth0" netns="/var/run/netns/cni-c630af34-51ad-0a09-43f2-939cc354cdd9" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:02.879 [INFO][3361] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:02.879 [INFO][3361] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.067 [INFO][3372] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.067 [INFO][3372] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.067 [INFO][3372] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.214 [WARNING][3372] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.214 [INFO][3372] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.220 [INFO][3372] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:03.234203 env[1834]: 2024-12-13 14:33:03.221 [INFO][3361] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:03.234079 systemd[1]: run-netns-cni\x2dc630af34\x2d51ad\x2d0a09\x2d43f2\x2d939cc354cdd9.mount: Deactivated successfully. Dec 13 14:33:03.249670 env[1834]: time="2024-12-13T14:33:03.249582491Z" level=info msg="TearDown network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" successfully" Dec 13 14:33:03.250357 env[1834]: time="2024-12-13T14:33:03.250320012Z" level=info msg="StopPodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" returns successfully" Dec 13 14:33:03.258494 env[1834]: time="2024-12-13T14:33:03.258433851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-nwvlw,Uid:c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b,Namespace:default,Attempt:1,}" Dec 13 14:33:03.325908 env[1834]: time="2024-12-13T14:33:03.325855193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:03.378762 env[1834]: time="2024-12-13T14:33:03.378706868Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:03.389225 env[1834]: time="2024-12-13T14:33:03.389173429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:03.400037 env[1834]: time="2024-12-13T14:33:03.399992237Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:03.402993 env[1834]: time="2024-12-13T14:33:03.401921290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:33:03.409639 kubelet[2290]: E1213 14:33:03.409607 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:03.411090 env[1834]: time="2024-12-13T14:33:03.411043514Z" level=info msg="CreateContainer within sandbox \"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:33:03.470649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3857919248.mount: Deactivated successfully. Dec 13 14:33:03.499029 env[1834]: time="2024-12-13T14:33:03.497510634Z" level=info msg="CreateContainer within sandbox \"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a3a17f4927003e8594cb42034cf28437410272231ff0a57397653c6893df5591\"" Dec 13 14:33:03.504456 env[1834]: time="2024-12-13T14:33:03.504393261Z" level=info msg="StartContainer for \"a3a17f4927003e8594cb42034cf28437410272231ff0a57397653c6893df5591\"" Dec 13 14:33:03.723508 env[1834]: time="2024-12-13T14:33:03.715059212Z" level=info msg="StartContainer for \"a3a17f4927003e8594cb42034cf28437410272231ff0a57397653c6893df5591\" returns successfully" Dec 13 14:33:03.723508 env[1834]: time="2024-12-13T14:33:03.721824094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:33:03.953712 systemd-networkd[1513]: cali9736c3a7c1e: Link UP Dec 13 14:33:03.966907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:03.967082 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9736c3a7c1e: link becomes ready Dec 13 14:33:03.967526 systemd-networkd[1513]: cali9736c3a7c1e: Gained carrier Dec 13 14:33:03.977751 (udev-worker)[3435]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.494 [INFO][3381] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0 nginx-deployment-6d5f899847- default c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b 1052 0 2024-12-13 14:32:47 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.21.211 nginx-deployment-6d5f899847-nwvlw eth0 default [] [] [kns.default ksa.default.default] cali9736c3a7c1e [] []}} ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.495 [INFO][3381] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.680 [INFO][3409] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" HandleID="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.804 [INFO][3409] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" HandleID="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00058b120), Attrs:map[string]string{"namespace":"default", "node":"172.31.21.211", "pod":"nginx-deployment-6d5f899847-nwvlw", "timestamp":"2024-12-13 14:33:03.680265337 +0000 UTC"}, Hostname:"172.31.21.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.804 [INFO][3409] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.804 [INFO][3409] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.805 [INFO][3409] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.211' Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.819 [INFO][3409] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.830 [INFO][3409] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.840 [INFO][3409] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.844 [INFO][3409] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.852 [INFO][3409] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.853 [INFO][3409] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.875 [INFO][3409] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.898 [INFO][3409] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.922 [INFO][3409] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.66/26] block=192.168.113.64/26 handle="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.922 [INFO][3409] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.66/26] handle="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" host="172.31.21.211" Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.923 [INFO][3409] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:04.018937 env[1834]: 2024-12-13 14:33:03.923 [INFO][3409] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.66/26] IPv6=[] ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" HandleID="k8s-pod-network.baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.021233 env[1834]: 2024-12-13 14:33:03.934 [INFO][3381] cni-plugin/k8s.go 386: Populated endpoint ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"", Pod:"nginx-deployment-6d5f899847-nwvlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9736c3a7c1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:04.021233 env[1834]: 2024-12-13 14:33:03.935 [INFO][3381] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.66/32] ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.021233 env[1834]: 2024-12-13 14:33:03.935 [INFO][3381] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9736c3a7c1e ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.021233 env[1834]: 2024-12-13 14:33:03.975 [INFO][3381] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.021233 env[1834]: 2024-12-13 14:33:03.980 [INFO][3381] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b", Pod:"nginx-deployment-6d5f899847-nwvlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9736c3a7c1e", MAC:"ca:7f:14:a6:ed:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:04.021233 env[1834]: 2024-12-13 14:33:04.003 [INFO][3381] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b" Namespace="default" Pod="nginx-deployment-6d5f899847-nwvlw" WorkloadEndpoint="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:04.042000 audit[3445]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:04.042000 audit[3445]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc4469fce0 a2=0 a3=7ffc4469fccc items=0 ppid=2968 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.042000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:04.060049 env[1834]: time="2024-12-13T14:33:04.059932029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:04.060049 env[1834]: time="2024-12-13T14:33:04.060016591Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:04.060370 env[1834]: time="2024-12-13T14:33:04.060325953Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:04.060744 env[1834]: time="2024-12-13T14:33:04.060692377Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b pid=3458 runtime=io.containerd.runc.v2 Dec 13 14:33:04.183732 env[1834]: time="2024-12-13T14:33:04.183686684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-nwvlw,Uid:c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b,Namespace:default,Attempt:1,} returns sandbox id \"baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b\"" Dec 13 14:33:04.410612 kubelet[2290]: E1213 14:33:04.410563 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:05.414222 kubelet[2290]: E1213 14:33:05.414177 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:05.783414 systemd-networkd[1513]: cali9736c3a7c1e: Gained IPv6LL Dec 13 14:33:06.072985 env[1834]: time="2024-12-13T14:33:06.072806685Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:06.090546 env[1834]: time="2024-12-13T14:33:06.090494818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:06.097056 env[1834]: time="2024-12-13T14:33:06.097008167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:06.100887 env[1834]: time="2024-12-13T14:33:06.100833069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:06.102593 env[1834]: time="2024-12-13T14:33:06.102533684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:33:06.106791 env[1834]: time="2024-12-13T14:33:06.106681976Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:33:06.107366 env[1834]: time="2024-12-13T14:33:06.107062770Z" level=info msg="CreateContainer within sandbox \"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:33:06.204084 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3198470456.mount: Deactivated successfully. Dec 13 14:33:06.216903 env[1834]: time="2024-12-13T14:33:06.216844610Z" level=info msg="CreateContainer within sandbox \"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"38d98843b43c70e5f5c1783a7ef49b4d89735d1fdb7b057a3b4e5bddd7ee5160\"" Dec 13 14:33:06.217906 env[1834]: time="2024-12-13T14:33:06.217867882Z" level=info msg="StartContainer for \"38d98843b43c70e5f5c1783a7ef49b4d89735d1fdb7b057a3b4e5bddd7ee5160\"" Dec 13 14:33:06.318942 systemd[1]: run-containerd-runc-k8s.io-38d98843b43c70e5f5c1783a7ef49b4d89735d1fdb7b057a3b4e5bddd7ee5160-runc.F4nDVK.mount: Deactivated successfully. Dec 13 14:33:06.413447 env[1834]: time="2024-12-13T14:33:06.410696204Z" level=info msg="StartContainer for \"38d98843b43c70e5f5c1783a7ef49b4d89735d1fdb7b057a3b4e5bddd7ee5160\" returns successfully" Dec 13 14:33:06.414565 kubelet[2290]: E1213 14:33:06.414505 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:06.583095 kubelet[2290]: I1213 14:33:06.582566 2290 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:33:06.585060 kubelet[2290]: I1213 14:33:06.584980 2290 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:33:06.855778 kubelet[2290]: I1213 14:33:06.855528 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-9pd9n" podStartSLOduration=34.617045948 podStartE2EDuration="39.855475045s" podCreationTimestamp="2024-12-13 14:32:27 +0000 UTC" firstStartedPulling="2024-12-13 14:33:00.86488975 +0000 UTC m=+34.002073129" lastFinishedPulling="2024-12-13 14:33:06.103318832 +0000 UTC m=+39.240502226" observedRunningTime="2024-12-13 14:33:06.855474005 +0000 UTC m=+39.992657403" watchObservedRunningTime="2024-12-13 14:33:06.855475045 +0000 UTC m=+39.992658442" Dec 13 14:33:07.038000 audit[3553]: NETFILTER_CFG table=filter:79 family=2 entries=14 op=nft_register_rule pid=3553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:07.040607 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 14:33:07.043735 kernel: audit: type=1325 audit(1734100387.038:366): table=filter:79 family=2 entries=14 op=nft_register_rule pid=3553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:07.038000 audit[3553]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe431b4110 a2=0 a3=7ffe431b40fc items=0 ppid=2531 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.063874 kernel: audit: type=1300 audit(1734100387.038:366): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe431b4110 a2=0 a3=7ffe431b40fc items=0 ppid=2531 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:07.067210 kernel: audit: type=1327 audit(1734100387.038:366): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:07.069000 audit[3553]: NETFILTER_CFG table=nat:80 family=2 entries=24 op=nft_register_rule pid=3553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:07.082245 kernel: audit: type=1325 audit(1734100387.069:367): table=nat:80 family=2 entries=24 op=nft_register_rule pid=3553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:07.082395 kernel: audit: type=1300 audit(1734100387.069:367): arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffe431b4110 a2=0 a3=7ffe431b40fc items=0 ppid=2531 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.082430 kernel: audit: type=1327 audit(1734100387.069:367): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:07.069000 audit[3553]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffe431b4110 a2=0 a3=7ffe431b40fc items=0 ppid=2531 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:07.370169 kubelet[2290]: E1213 14:33:07.370108 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:07.415371 kubelet[2290]: E1213 14:33:07.415318 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:08.356115 kernel: audit: type=1325 audit(1734100388.329:368): table=filter:81 family=2 entries=11 op=nft_register_rule pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:08.356271 kernel: audit: type=1300 audit(1734100388.329:368): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffea1085f70 a2=0 a3=7ffea1085f5c items=0 ppid=2531 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:08.329000 audit[3561]: NETFILTER_CFG table=filter:81 family=2 entries=11 op=nft_register_rule pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:08.329000 audit[3561]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffea1085f70 a2=0 a3=7ffea1085f5c items=0 ppid=2531 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:08.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:08.371664 kernel: audit: type=1327 audit(1734100388.329:368): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:08.367000 audit[3561]: NETFILTER_CFG table=nat:82 family=2 entries=37 op=nft_register_chain pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:08.367000 audit[3561]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffea1085f70 a2=0 a3=7ffea1085f5c items=0 ppid=2531 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:08.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:08.376535 kernel: audit: type=1325 audit(1734100388.367:369): table=nat:82 family=2 entries=37 op=nft_register_chain pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:08.415857 kubelet[2290]: E1213 14:33:08.415768 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:08.513000 audit[3566]: NETFILTER_CFG table=filter:83 family=2 entries=8 op=nft_register_rule pid=3566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:08.513000 audit[3566]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc63d7d530 a2=0 a3=7ffc63d7d51c items=0 ppid=2531 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:08.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:08.552000 audit[3566]: NETFILTER_CFG table=nat:84 family=2 entries=58 op=nft_register_chain pid=3566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:08.552000 audit[3566]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffc63d7d530 a2=0 a3=7ffc63d7d51c items=0 ppid=2531 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:08.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:09.416358 kubelet[2290]: E1213 14:33:09.416249 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:09.651000 audit[3571]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=3571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:09.651000 audit[3571]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe81779510 a2=0 a3=7ffe817794fc items=0 ppid=2531 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:09.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:09.658000 audit[3571]: NETFILTER_CFG table=nat:86 family=2 entries=34 op=nft_register_chain pid=3571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:09.658000 audit[3571]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe81779510 a2=0 a3=7ffe817794fc items=0 ppid=2531 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:09.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:10.027079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount398150572.mount: Deactivated successfully. Dec 13 14:33:10.416959 kubelet[2290]: E1213 14:33:10.416877 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:11.417198 kubelet[2290]: E1213 14:33:11.417144 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:12.418692 kubelet[2290]: E1213 14:33:12.418642 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:12.568717 env[1834]: time="2024-12-13T14:33:12.568662666Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:12.572149 env[1834]: time="2024-12-13T14:33:12.572091469Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:12.578627 env[1834]: time="2024-12-13T14:33:12.578582621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:12.583676 env[1834]: time="2024-12-13T14:33:12.583623791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:12.587965 env[1834]: time="2024-12-13T14:33:12.587684510Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:33:12.593372 env[1834]: time="2024-12-13T14:33:12.593281960Z" level=info msg="CreateContainer within sandbox \"baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:33:12.615834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1351330493.mount: Deactivated successfully. Dec 13 14:33:12.631243 env[1834]: time="2024-12-13T14:33:12.631199502Z" level=info msg="CreateContainer within sandbox \"baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4c6f6de8a611fe5744d3976f489b8f5b4c1ea977a2f513c0217042503f072109\"" Dec 13 14:33:12.632121 env[1834]: time="2024-12-13T14:33:12.632045374Z" level=info msg="StartContainer for \"4c6f6de8a611fe5744d3976f489b8f5b4c1ea977a2f513c0217042503f072109\"" Dec 13 14:33:12.757145 env[1834]: time="2024-12-13T14:33:12.756343144Z" level=info msg="StartContainer for \"4c6f6de8a611fe5744d3976f489b8f5b4c1ea977a2f513c0217042503f072109\" returns successfully" Dec 13 14:33:12.899513 kubelet[2290]: I1213 14:33:12.899471 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-nwvlw" podStartSLOduration=17.497968131 podStartE2EDuration="25.899435397s" podCreationTimestamp="2024-12-13 14:32:47 +0000 UTC" firstStartedPulling="2024-12-13 14:33:04.186690255 +0000 UTC m=+37.323873635" lastFinishedPulling="2024-12-13 14:33:12.588157513 +0000 UTC m=+45.725340901" observedRunningTime="2024-12-13 14:33:12.899237828 +0000 UTC m=+46.036421223" watchObservedRunningTime="2024-12-13 14:33:12.899435397 +0000 UTC m=+46.036618792" Dec 13 14:33:13.419945 kubelet[2290]: E1213 14:33:13.419700 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:14.420563 kubelet[2290]: E1213 14:33:14.420512 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:15.421521 kubelet[2290]: E1213 14:33:15.421467 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:16.422530 kubelet[2290]: E1213 14:33:16.422428 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:17.422893 kubelet[2290]: E1213 14:33:17.422762 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:18.423589 kubelet[2290]: E1213 14:33:18.423533 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:19.424709 kubelet[2290]: E1213 14:33:19.424657 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:20.425558 kubelet[2290]: E1213 14:33:20.425510 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:21.426273 kubelet[2290]: E1213 14:33:21.426238 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:22.427302 kubelet[2290]: E1213 14:33:22.427251 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:23.427515 kubelet[2290]: E1213 14:33:23.427461 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:24.428076 kubelet[2290]: E1213 14:33:24.428032 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:24.936000 audit[3637]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:24.938743 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 14:33:24.938807 kernel: audit: type=1325 audit(1734100404.936:374): table=filter:87 family=2 entries=8 op=nft_register_rule pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:24.936000 audit[3637]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1fe53b80 a2=0 a3=7ffc1fe53b6c items=0 ppid=2531 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.952070 kernel: audit: type=1300 audit(1734100404.936:374): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1fe53b80 a2=0 a3=7ffc1fe53b6c items=0 ppid=2531 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.952230 kernel: audit: type=1327 audit(1734100404.936:374): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:24.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:24.956000 audit[3637]: NETFILTER_CFG table=nat:88 family=2 entries=30 op=nft_register_rule pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:24.956000 audit[3637]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc1fe53b80 a2=0 a3=7ffc1fe53b6c items=0 ppid=2531 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.973184 kernel: audit: type=1325 audit(1734100404.956:375): table=nat:88 family=2 entries=30 op=nft_register_rule pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:24.973332 kernel: audit: type=1300 audit(1734100404.956:375): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc1fe53b80 a2=0 a3=7ffc1fe53b6c items=0 ppid=2531 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.973435 kernel: audit: type=1327 audit(1734100404.956:375): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:24.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:25.428693 kubelet[2290]: E1213 14:33:25.428638 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:25.661375 kubelet[2290]: I1213 14:33:25.661331 2290 topology_manager.go:215] "Topology Admit Handler" podUID="6d3bde68-06d2-4041-89ff-7b733eb6910d" podNamespace="calico-system" podName="calico-typha-7f9f5bfdf8-42jz8" Dec 13 14:33:25.724000 audit[3639]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:25.724000 audit[3639]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffadf035c0 a2=0 a3=7fffadf035ac items=0 ppid=2531 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.734733 kernel: audit: type=1325 audit(1734100405.724:376): table=filter:89 family=2 entries=8 op=nft_register_rule pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:25.734923 kernel: audit: type=1300 audit(1734100405.724:376): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffadf035c0 a2=0 a3=7fffadf035ac items=0 ppid=2531 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.735134 kernel: audit: type=1327 audit(1734100405.724:376): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:25.724000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:25.738000 audit[3639]: NETFILTER_CFG table=nat:90 family=2 entries=30 op=nft_register_rule pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:25.738000 audit[3639]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffadf035c0 a2=0 a3=7fffadf035ac items=0 ppid=2531 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:25.744225 kernel: audit: type=1325 audit(1734100405.738:377): table=nat:90 family=2 entries=30 op=nft_register_rule pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:25.777642 kubelet[2290]: I1213 14:33:25.777598 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6d3bde68-06d2-4041-89ff-7b733eb6910d-typha-certs\") pod \"calico-typha-7f9f5bfdf8-42jz8\" (UID: \"6d3bde68-06d2-4041-89ff-7b733eb6910d\") " pod="calico-system/calico-typha-7f9f5bfdf8-42jz8" Dec 13 14:33:25.777923 kubelet[2290]: I1213 14:33:25.777659 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6d3bde68-06d2-4041-89ff-7b733eb6910d-tigera-ca-bundle\") pod \"calico-typha-7f9f5bfdf8-42jz8\" (UID: \"6d3bde68-06d2-4041-89ff-7b733eb6910d\") " pod="calico-system/calico-typha-7f9f5bfdf8-42jz8" Dec 13 14:33:25.777923 kubelet[2290]: I1213 14:33:25.777693 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jmbkb\" (UniqueName: \"kubernetes.io/projected/6d3bde68-06d2-4041-89ff-7b733eb6910d-kube-api-access-jmbkb\") pod \"calico-typha-7f9f5bfdf8-42jz8\" (UID: \"6d3bde68-06d2-4041-89ff-7b733eb6910d\") " pod="calico-system/calico-typha-7f9f5bfdf8-42jz8" Dec 13 14:33:25.966441 env[1834]: time="2024-12-13T14:33:25.966388717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7f9f5bfdf8-42jz8,Uid:6d3bde68-06d2-4041-89ff-7b733eb6910d,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:26.010000 audit[3656]: NETFILTER_CFG table=filter:91 family=2 entries=20 op=nft_register_rule pid=3656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:26.010000 audit[3656]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff139ef8e0 a2=0 a3=7fff139ef8cc items=0 ppid=2531 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:26.027000 audit[3656]: NETFILTER_CFG table=nat:92 family=2 entries=22 op=nft_register_rule pid=3656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:26.027000 audit[3656]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff139ef8e0 a2=0 a3=0 items=0 ppid=2531 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:26.038525 env[1834]: time="2024-12-13T14:33:26.038429346Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:26.038525 env[1834]: time="2024-12-13T14:33:26.038480979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:26.038525 env[1834]: time="2024-12-13T14:33:26.038496463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:26.039774 env[1834]: time="2024-12-13T14:33:26.038916826Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/850f39fc346142e599664300d4d3d16a78b85ab939a684d4c9cf71eee344cb93 pid=3651 runtime=io.containerd.runc.v2 Dec 13 14:33:26.107561 env[1834]: time="2024-12-13T14:33:26.107516348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7f9f5bfdf8-42jz8,Uid:6d3bde68-06d2-4041-89ff-7b733eb6910d,Namespace:calico-system,Attempt:0,} returns sandbox id \"850f39fc346142e599664300d4d3d16a78b85ab939a684d4c9cf71eee344cb93\"" Dec 13 14:33:26.109434 env[1834]: time="2024-12-13T14:33:26.109401133Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:33:26.243784 kubelet[2290]: I1213 14:33:26.243743 2290 topology_manager.go:215] "Topology Admit Handler" podUID="0413cf63-b7c8-4442-bd92-853dd12be1e4" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:33:26.390592 kubelet[2290]: I1213 14:33:26.390407 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0413cf63-b7c8-4442-bd92-853dd12be1e4-data\") pod \"nfs-server-provisioner-0\" (UID: \"0413cf63-b7c8-4442-bd92-853dd12be1e4\") " pod="default/nfs-server-provisioner-0" Dec 13 14:33:26.390592 kubelet[2290]: I1213 14:33:26.390476 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcpfw\" (UniqueName: \"kubernetes.io/projected/0413cf63-b7c8-4442-bd92-853dd12be1e4-kube-api-access-qcpfw\") pod \"nfs-server-provisioner-0\" (UID: \"0413cf63-b7c8-4442-bd92-853dd12be1e4\") " pod="default/nfs-server-provisioner-0" Dec 13 14:33:26.429105 kubelet[2290]: E1213 14:33:26.429050 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:26.549781 env[1834]: time="2024-12-13T14:33:26.549593344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0413cf63-b7c8-4442-bd92-853dd12be1e4,Namespace:default,Attempt:0,}" Dec 13 14:33:26.895054 systemd-networkd[1513]: cali60e51b789ff: Link UP Dec 13 14:33:26.895673 (udev-worker)[3706]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:33:26.908433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:26.909563 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:33:26.910209 systemd-networkd[1513]: cali60e51b789ff: Gained carrier Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.717 [INFO][3688] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.211-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0413cf63-b7c8-4442-bd92-853dd12be1e4 1257 0 2024-12-13 14:33:26 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.21.211 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.717 [INFO][3688] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.777 [INFO][3699] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" HandleID="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Workload="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.795 [INFO][3699] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" HandleID="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Workload="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003049e0), Attrs:map[string]string{"namespace":"default", "node":"172.31.21.211", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:33:26.777015767 +0000 UTC"}, Hostname:"172.31.21.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.795 [INFO][3699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.796 [INFO][3699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.796 [INFO][3699] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.211' Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.801 [INFO][3699] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.809 [INFO][3699] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.819 [INFO][3699] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.845 [INFO][3699] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.853 [INFO][3699] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.853 [INFO][3699] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.857 [INFO][3699] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.867 [INFO][3699] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.878 [INFO][3699] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.67/26] block=192.168.113.64/26 handle="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.878 [INFO][3699] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.67/26] handle="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" host="172.31.21.211" Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.878 [INFO][3699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:26.958397 env[1834]: 2024-12-13 14:33:26.878 [INFO][3699] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.67/26] IPv6=[] ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" HandleID="k8s-pod-network.a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Workload="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.959607 env[1834]: 2024-12-13 14:33:26.885 [INFO][3688] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0413cf63-b7c8-4442-bd92-853dd12be1e4", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:26.959607 env[1834]: 2024-12-13 14:33:26.885 [INFO][3688] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.67/32] ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.959607 env[1834]: 2024-12-13 14:33:26.885 [INFO][3688] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.959607 env[1834]: 2024-12-13 14:33:26.912 [INFO][3688] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.959880 env[1834]: 2024-12-13 14:33:26.914 [INFO][3688] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0413cf63-b7c8-4442-bd92-853dd12be1e4", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"7a:ef:c5:56:f1:aa", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:26.959880 env[1834]: 2024-12-13 14:33:26.939 [INFO][3688] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.21.211-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:33:26.983000 audit[3726]: NETFILTER_CFG table=filter:93 family=2 entries=38 op=nft_register_chain pid=3726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:26.983000 audit[3726]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffdf2178890 a2=0 a3=7ffdf217887c items=0 ppid=2968 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:27.009812 env[1834]: time="2024-12-13T14:33:27.009690434Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:27.009812 env[1834]: time="2024-12-13T14:33:27.009762510Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:27.010516 env[1834]: time="2024-12-13T14:33:27.009778624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:27.010516 env[1834]: time="2024-12-13T14:33:27.009990423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc pid=3736 runtime=io.containerd.runc.v2 Dec 13 14:33:27.066000 audit[3756]: NETFILTER_CFG table=filter:94 family=2 entries=32 op=nft_register_rule pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:27.066000 audit[3756]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe3491b2c0 a2=0 a3=7ffe3491b2ac items=0 ppid=2531 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:27.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:27.074000 audit[3756]: NETFILTER_CFG table=nat:95 family=2 entries=22 op=nft_register_rule pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:27.074000 audit[3756]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3491b2c0 a2=0 a3=0 items=0 ppid=2531 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:27.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:27.138108 env[1834]: time="2024-12-13T14:33:27.137375186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0413cf63-b7c8-4442-bd92-853dd12be1e4,Namespace:default,Attempt:0,} returns sandbox id \"a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc\"" Dec 13 14:33:27.370538 kubelet[2290]: E1213 14:33:27.370444 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:27.411572 env[1834]: time="2024-12-13T14:33:27.411509466Z" level=info msg="StopPodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\"" Dec 13 14:33:27.429736 kubelet[2290]: E1213 14:33:27.429660 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.512 [WARNING][3785] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-csi--node--driver--9pd9n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f09de66-c27e-4908-9687-1007fc5643ee", ResourceVersion:"1100", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b", Pod:"csi-node-driver-9pd9n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calice33f1662d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.512 [INFO][3785] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.512 [INFO][3785] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" iface="eth0" netns="" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.512 [INFO][3785] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.512 [INFO][3785] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.557 [INFO][3791] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.558 [INFO][3791] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.558 [INFO][3791] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.589 [WARNING][3791] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.590 [INFO][3791] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.594 [INFO][3791] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:27.604879 env[1834]: 2024-12-13 14:33:27.596 [INFO][3785] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.604879 env[1834]: time="2024-12-13T14:33:27.604407567Z" level=info msg="TearDown network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" successfully" Dec 13 14:33:27.604879 env[1834]: time="2024-12-13T14:33:27.604454035Z" level=info msg="StopPodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" returns successfully" Dec 13 14:33:27.605766 env[1834]: time="2024-12-13T14:33:27.605212036Z" level=info msg="RemovePodSandbox for \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\"" Dec 13 14:33:27.605766 env[1834]: time="2024-12-13T14:33:27.605250629Z" level=info msg="Forcibly stopping sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\"" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.677 [WARNING][3814] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-csi--node--driver--9pd9n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4f09de66-c27e-4908-9687-1007fc5643ee", ResourceVersion:"1100", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"b055463d0dc0ffbfff7b5ad58a592283a239edf5dd1559c7ef8ca3e3e506970b", Pod:"csi-node-driver-9pd9n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calice33f1662d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.677 [INFO][3814] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.677 [INFO][3814] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" iface="eth0" netns="" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.677 [INFO][3814] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.677 [INFO][3814] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.756 [INFO][3820] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.756 [INFO][3820] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.756 [INFO][3820] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.769 [WARNING][3820] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.769 [INFO][3820] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" HandleID="k8s-pod-network.5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Workload="172.31.21.211-k8s-csi--node--driver--9pd9n-eth0" Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.775 [INFO][3820] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:27.779023 env[1834]: 2024-12-13 14:33:27.777 [INFO][3814] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c" Dec 13 14:33:27.779700 env[1834]: time="2024-12-13T14:33:27.779060749Z" level=info msg="TearDown network for sandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" successfully" Dec 13 14:33:27.785099 env[1834]: time="2024-12-13T14:33:27.785047896Z" level=info msg="RemovePodSandbox \"5a7e38880a27e356b60f4793300ccf0cf750aae3e63f4b2119c86559cffa064c\" returns successfully" Dec 13 14:33:27.785832 env[1834]: time="2024-12-13T14:33:27.785798862Z" level=info msg="StopPodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\"" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.056 [WARNING][3841] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b", ResourceVersion:"1155", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b", Pod:"nginx-deployment-6d5f899847-nwvlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9736c3a7c1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.057 [INFO][3841] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.057 [INFO][3841] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" iface="eth0" netns="" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.057 [INFO][3841] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.057 [INFO][3841] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.190 [INFO][3858] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.190 [INFO][3858] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.190 [INFO][3858] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.201 [WARNING][3858] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.201 [INFO][3858] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.204 [INFO][3858] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:28.208585 env[1834]: 2024-12-13 14:33:28.206 [INFO][3841] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.210690 env[1834]: time="2024-12-13T14:33:28.210647210Z" level=info msg="TearDown network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" successfully" Dec 13 14:33:28.210774 env[1834]: time="2024-12-13T14:33:28.210756787Z" level=info msg="StopPodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" returns successfully" Dec 13 14:33:28.211607 env[1834]: time="2024-12-13T14:33:28.211572890Z" level=info msg="RemovePodSandbox for \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\"" Dec 13 14:33:28.211716 env[1834]: time="2024-12-13T14:33:28.211616656Z" level=info msg="Forcibly stopping sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\"" Dec 13 14:33:28.407933 systemd-networkd[1513]: cali60e51b789ff: Gained IPv6LL Dec 13 14:33:28.451516 kubelet[2290]: E1213 14:33:28.451459 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.347 [WARNING][3879] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c0b7d98d-c6ca-4252-84c2-74f36f7f3f9b", ResourceVersion:"1155", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"baf5f8b181f76c9a13d35a24ba43889a196bbb0d473c369dba4773343095e73b", Pod:"nginx-deployment-6d5f899847-nwvlw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9736c3a7c1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.347 [INFO][3879] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.347 [INFO][3879] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" iface="eth0" netns="" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.347 [INFO][3879] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.347 [INFO][3879] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.547 [INFO][3885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.548 [INFO][3885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.548 [INFO][3885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.598 [WARNING][3885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.598 [INFO][3885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" HandleID="k8s-pod-network.61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Workload="172.31.21.211-k8s-nginx--deployment--6d5f899847--nwvlw-eth0" Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.606 [INFO][3885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:28.612442 env[1834]: 2024-12-13 14:33:28.609 [INFO][3879] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac" Dec 13 14:33:28.617321 kubelet[2290]: I1213 14:33:28.614316 2290 topology_manager.go:215] "Topology Admit Handler" podUID="26e82c75-b746-42a7-8a44-3696990105e8" podNamespace="calico-system" podName="calico-kube-controllers-74667b956-29hxb" Dec 13 14:33:28.622701 env[1834]: time="2024-12-13T14:33:28.622649875Z" level=info msg="TearDown network for sandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" successfully" Dec 13 14:33:28.627321 env[1834]: time="2024-12-13T14:33:28.627275293Z" level=info msg="RemovePodSandbox \"61d29c71f88051c75b6fe918287659e0455e36d1d0826adc3b233b89a94bccac\" returns successfully" Dec 13 14:33:28.733526 kubelet[2290]: I1213 14:33:28.733495 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/26e82c75-b746-42a7-8a44-3696990105e8-tigera-ca-bundle\") pod \"calico-kube-controllers-74667b956-29hxb\" (UID: \"26e82c75-b746-42a7-8a44-3696990105e8\") " pod="calico-system/calico-kube-controllers-74667b956-29hxb" Dec 13 14:33:28.733842 kubelet[2290]: I1213 14:33:28.733828 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pvtkn\" (UniqueName: \"kubernetes.io/projected/26e82c75-b746-42a7-8a44-3696990105e8-kube-api-access-pvtkn\") pod \"calico-kube-controllers-74667b956-29hxb\" (UID: \"26e82c75-b746-42a7-8a44-3696990105e8\") " pod="calico-system/calico-kube-controllers-74667b956-29hxb" Dec 13 14:33:28.926877 env[1834]: time="2024-12-13T14:33:28.926821762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74667b956-29hxb,Uid:26e82c75-b746-42a7-8a44-3696990105e8,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:29.355804 systemd-networkd[1513]: cali19d8a27526b: Link UP Dec 13 14:33:29.358063 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:29.358483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali19d8a27526b: link becomes ready Dec 13 14:33:29.358260 systemd-networkd[1513]: cali19d8a27526b: Gained carrier Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.090 [INFO][3899] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0 calico-kube-controllers-74667b956- calico-system 26e82c75-b746-42a7-8a44-3696990105e8 1309 0 2024-12-13 14:33:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74667b956 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 172.31.21.211 calico-kube-controllers-74667b956-29hxb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali19d8a27526b [] []}} ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.090 [INFO][3899] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.271 [INFO][3915] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" HandleID="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Workload="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.296 [INFO][3915] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" HandleID="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Workload="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ec80), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.21.211", "pod":"calico-kube-controllers-74667b956-29hxb", "timestamp":"2024-12-13 14:33:29.271232976 +0000 UTC"}, Hostname:"172.31.21.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.296 [INFO][3915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.296 [INFO][3915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.296 [INFO][3915] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.211' Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.298 [INFO][3915] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.305 [INFO][3915] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.312 [INFO][3915] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.315 [INFO][3915] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.319 [INFO][3915] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.319 [INFO][3915] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.321 [INFO][3915] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30 Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.328 [INFO][3915] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.338 [INFO][3915] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.68/26] block=192.168.113.64/26 handle="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.339 [INFO][3915] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.68/26] handle="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" host="172.31.21.211" Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.339 [INFO][3915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:29.393133 env[1834]: 2024-12-13 14:33:29.339 [INFO][3915] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.68/26] IPv6=[] ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" HandleID="k8s-pod-network.f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Workload="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.397666 env[1834]: 2024-12-13 14:33:29.341 [INFO][3899] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0", GenerateName:"calico-kube-controllers-74667b956-", Namespace:"calico-system", SelfLink:"", UID:"26e82c75-b746-42a7-8a44-3696990105e8", ResourceVersion:"1309", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74667b956", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"", Pod:"calico-kube-controllers-74667b956-29hxb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali19d8a27526b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:29.397666 env[1834]: 2024-12-13 14:33:29.341 [INFO][3899] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.68/32] ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.397666 env[1834]: 2024-12-13 14:33:29.341 [INFO][3899] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali19d8a27526b ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.397666 env[1834]: 2024-12-13 14:33:29.358 [INFO][3899] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.397666 env[1834]: 2024-12-13 14:33:29.359 [INFO][3899] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0", GenerateName:"calico-kube-controllers-74667b956-", Namespace:"calico-system", SelfLink:"", UID:"26e82c75-b746-42a7-8a44-3696990105e8", ResourceVersion:"1309", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74667b956", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30", Pod:"calico-kube-controllers-74667b956-29hxb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali19d8a27526b", MAC:"22:d8:62:d6:55:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:29.397666 env[1834]: 2024-12-13 14:33:29.374 [INFO][3899] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30" Namespace="calico-system" Pod="calico-kube-controllers-74667b956-29hxb" WorkloadEndpoint="172.31.21.211-k8s-calico--kube--controllers--74667b956--29hxb-eth0" Dec 13 14:33:29.398000 audit[3932]: NETFILTER_CFG table=filter:96 family=2 entries=42 op=nft_register_chain pid=3932 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:29.398000 audit[3932]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffecc884280 a2=0 a3=7ffecc88426c items=0 ppid=2968 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:29.398000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:29.438441 env[1834]: time="2024-12-13T14:33:29.438369620Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:29.438647 env[1834]: time="2024-12-13T14:33:29.438621030Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:29.438760 env[1834]: time="2024-12-13T14:33:29.438738419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:29.439048 env[1834]: time="2024-12-13T14:33:29.438989595Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30 pid=3951 runtime=io.containerd.runc.v2 Dec 13 14:33:29.452052 kubelet[2290]: E1213 14:33:29.451911 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:29.552601 env[1834]: time="2024-12-13T14:33:29.552555201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74667b956-29hxb,Uid:26e82c75-b746-42a7-8a44-3696990105e8,Namespace:calico-system,Attempt:0,} returns sandbox id \"f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30\"" Dec 13 14:33:29.843543 env[1834]: time="2024-12-13T14:33:29.843494615Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:29.846775 env[1834]: time="2024-12-13T14:33:29.846727598Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:29.849433 env[1834]: time="2024-12-13T14:33:29.849315422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:29.852022 env[1834]: time="2024-12-13T14:33:29.851981563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:29.852608 env[1834]: time="2024-12-13T14:33:29.852575338Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:33:29.860663 env[1834]: time="2024-12-13T14:33:29.857735547Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:33:29.873632 env[1834]: time="2024-12-13T14:33:29.873582847Z" level=info msg="CreateContainer within sandbox \"850f39fc346142e599664300d4d3d16a78b85ab939a684d4c9cf71eee344cb93\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:33:29.913061 env[1834]: time="2024-12-13T14:33:29.912999985Z" level=info msg="CreateContainer within sandbox \"850f39fc346142e599664300d4d3d16a78b85ab939a684d4c9cf71eee344cb93\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"785cd1d2268551f5e5a6c7cda247c3adf0bc5ffa6efdba0333dd11f9b2b3e91d\"" Dec 13 14:33:29.913958 env[1834]: time="2024-12-13T14:33:29.913920514Z" level=info msg="StartContainer for \"785cd1d2268551f5e5a6c7cda247c3adf0bc5ffa6efdba0333dd11f9b2b3e91d\"" Dec 13 14:33:30.075758 env[1834]: time="2024-12-13T14:33:30.075697858Z" level=info msg="StartContainer for \"785cd1d2268551f5e5a6c7cda247c3adf0bc5ffa6efdba0333dd11f9b2b3e91d\" returns successfully" Dec 13 14:33:30.452313 kubelet[2290]: E1213 14:33:30.452262 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:30.863867 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:33:30.863988 kernel: audit: type=1325 audit(1734100410.780:384): table=filter:97 family=2 entries=33 op=nft_register_rule pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:30.864023 kernel: audit: type=1300 audit(1734100410.780:384): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff70da5430 a2=0 a3=7fff70da541c items=0 ppid=2531 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:30.864049 kernel: audit: type=1327 audit(1734100410.780:384): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:30.780000 audit[4043]: NETFILTER_CFG table=filter:97 family=2 entries=33 op=nft_register_rule pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:30.780000 audit[4043]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff70da5430 a2=0 a3=7fff70da541c items=0 ppid=2531 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:30.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:30.777466 systemd-networkd[1513]: cali19d8a27526b: Gained IPv6LL Dec 13 14:33:30.899455 kernel: audit: type=1325 audit(1734100410.897:385): table=nat:98 family=2 entries=27 op=nft_unregister_chain pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:30.900928 kernel: audit: type=1300 audit(1734100410.897:385): arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7fff70da5430 a2=0 a3=0 items=0 ppid=2531 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:30.901005 kernel: audit: type=1327 audit(1734100410.897:385): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:30.897000 audit[4043]: NETFILTER_CFG table=nat:98 family=2 entries=27 op=nft_unregister_chain pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:30.897000 audit[4043]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7fff70da5430 a2=0 a3=0 items=0 ppid=2531 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:30.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.062831 kubelet[2290]: I1213 14:33:31.062492 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7f9f5bfdf8-42jz8" podStartSLOduration=3.317179705 podStartE2EDuration="7.062417637s" podCreationTimestamp="2024-12-13 14:33:24 +0000 UTC" firstStartedPulling="2024-12-13 14:33:26.108881975 +0000 UTC m=+59.246065352" lastFinishedPulling="2024-12-13 14:33:29.854119898 +0000 UTC m=+62.991303284" observedRunningTime="2024-12-13 14:33:31.047744347 +0000 UTC m=+64.184927743" watchObservedRunningTime="2024-12-13 14:33:31.062417637 +0000 UTC m=+64.199601095" Dec 13 14:33:31.104005 kernel: audit: type=1325 audit(1734100411.090:386): table=filter:99 family=2 entries=33 op=nft_register_rule pid=4045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.107120 kernel: audit: type=1300 audit(1734100411.090:386): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff36473520 a2=0 a3=7fff3647350c items=0 ppid=2531 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.107242 kernel: audit: type=1327 audit(1734100411.090:386): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.090000 audit[4045]: NETFILTER_CFG table=filter:99 family=2 entries=33 op=nft_register_rule pid=4045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.090000 audit[4045]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff36473520 a2=0 a3=7fff3647350c items=0 ppid=2531 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.105000 audit[4045]: NETFILTER_CFG table=nat:100 family=2 entries=27 op=nft_register_chain pid=4045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.115084 kernel: audit: type=1325 audit(1734100411.105:387): table=nat:100 family=2 entries=27 op=nft_register_chain pid=4045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.105000 audit[4045]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff36473520 a2=0 a3=0 items=0 ppid=2531 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.453470 kubelet[2290]: E1213 14:33:31.453421 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit: BPF prog-id=29 op=LOAD Dec 13 14:33:32.114000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeef43f510 a2=98 a3=3 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.114000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.114000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit: BPF prog-id=30 op=LOAD Dec 13 14:33:32.114000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeef43f2f0 a2=74 a3=540051 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.114000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.114000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.114000 audit: BPF prog-id=31 op=LOAD Dec 13 14:33:32.114000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeef43f320 a2=94 a3=2 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.114000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.114000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit: BPF prog-id=32 op=LOAD Dec 13 14:33:32.349000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeef43f1e0 a2=40 a3=1 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.349000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:33:32.349000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.349000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeef43f2b0 a2=50 a3=7ffeef43f390 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.376000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.376000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeef43f1f0 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.376000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.376000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.376000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeef43f220 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.376000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.376000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.376000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeef43f130 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.376000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.376000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.376000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeef43f240 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.376000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.376000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.376000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeef43f220 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.376000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeef43f210 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeef43f240 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeef43f220 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeef43f240 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeef43f210 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeef43f280 a2=28 a3=0 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeef43f030 a2=50 a3=1 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit: BPF prog-id=33 op=LOAD Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeef43f030 a2=94 a3=5 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.377000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:33:32.377000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.377000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeef43f0e0 a2=50 a3=1 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.377000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeef43f200 a2=4 a3=38 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.378000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { confidentiality } for pid=4081 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:32.378000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeef43f250 a2=94 a3=6 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.378000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.378000 audit[4081]: AVC avc: denied { confidentiality } for pid=4081 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:32.378000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeef43ea00 a2=94 a3=83 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.378000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.379000 audit[4081]: AVC avc: denied { confidentiality } for pid=4081 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:32.379000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeef43ea00 a2=94 a3=83 items=0 ppid=4067 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.379000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.386000 audit: BPF prog-id=34 op=LOAD Dec 13 14:33:32.386000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd53d18050 a2=98 a3=3 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.386000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.386000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit: BPF prog-id=35 op=LOAD Dec 13 14:33:32.391000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd53d17e30 a2=74 a3=540051 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.391000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.391000 audit: BPF prog-id=36 op=LOAD Dec 13 14:33:32.391000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd53d17e60 a2=94 a3=2 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.391000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:33:32.454325 kubelet[2290]: E1213 14:33:32.454252 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit: BPF prog-id=37 op=LOAD Dec 13 14:33:32.789000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd53d17d20 a2=40 a3=1 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.789000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:33:32.789000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.789000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd53d17df0 a2=50 a3=7ffd53d17ed0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd53d17d30 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd53d17d60 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd53d17c70 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd53d17d80 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd53d17d60 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd53d17d50 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd53d17d80 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd53d17d60 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd53d17d80 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd53d17d50 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.828000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.828000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd53d17dc0 a2=28 a3=0 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd53d17b70 a2=50 a3=1 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit: BPF prog-id=38 op=LOAD Dec 13 14:33:32.829000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd53d17b70 a2=94 a3=5 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.829000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd53d17c20 a2=50 a3=1 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd53d17d40 a2=4 a3=38 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.829000 audit[4088]: AVC avc: denied { confidentiality } for pid=4088 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:32.829000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd53d17d90 a2=94 a3=6 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { confidentiality } for pid=4088 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:32.830000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd53d17540 a2=94 a3=83 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.830000 audit[4088]: AVC avc: denied { confidentiality } for pid=4088 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:32.830000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd53d17540 a2=94 a3=83 items=0 ppid=4067 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.896000 audit: BPF prog-id=39 op=LOAD Dec 13 14:33:32.896000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe25232060 a2=98 a3=1999999999999999 items=0 ppid=4067 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.896000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:32.899000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.899000 audit: BPF prog-id=40 op=LOAD Dec 13 14:33:32.899000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe25231f40 a2=74 a3=ffff items=0 ppid=4067 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.899000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:32.901000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.901000 audit: BPF prog-id=41 op=LOAD Dec 13 14:33:32.901000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe25231f80 a2=40 a3=7ffe25232160 items=0 ppid=4067 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.901000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:32.902000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:33:33.454497 kubelet[2290]: E1213 14:33:33.454453 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:34.194343 systemd[1]: run-containerd-runc-k8s.io-e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6-runc.vjEAkJ.mount: Deactivated successfully. Dec 13 14:33:34.454892 kubelet[2290]: E1213 14:33:34.454783 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:34.700146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3128454146.mount: Deactivated successfully. Dec 13 14:33:35.455898 kubelet[2290]: E1213 14:33:35.455862 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:36.456507 kubelet[2290]: E1213 14:33:36.456471 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:37.457321 kubelet[2290]: E1213 14:33:37.457200 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:38.220142 env[1834]: time="2024-12-13T14:33:38.220085858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:38.223579 env[1834]: time="2024-12-13T14:33:38.223529625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:38.231465 env[1834]: time="2024-12-13T14:33:38.231417725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:38.239396 env[1834]: time="2024-12-13T14:33:38.239339981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:38.252110 env[1834]: time="2024-12-13T14:33:38.252061878Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:33:38.253431 env[1834]: time="2024-12-13T14:33:38.253400007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:33:38.254472 env[1834]: time="2024-12-13T14:33:38.254431817Z" level=info msg="CreateContainer within sandbox \"a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:33:38.286650 env[1834]: time="2024-12-13T14:33:38.286587295Z" level=info msg="CreateContainer within sandbox \"a1c34b6edab52b3f8abf2682663e4adfbdbe729f62cbf89145ee3c1dd2f95bbc\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"45ec4b0926eb7590d63d8c2deadb68ad3e0587dfbea18a3ff3f3c5a1cc0b6448\"" Dec 13 14:33:38.287752 env[1834]: time="2024-12-13T14:33:38.287663162Z" level=info msg="StartContainer for \"45ec4b0926eb7590d63d8c2deadb68ad3e0587dfbea18a3ff3f3c5a1cc0b6448\"" Dec 13 14:33:38.421126 env[1834]: time="2024-12-13T14:33:38.421072544Z" level=info msg="StartContainer for \"45ec4b0926eb7590d63d8c2deadb68ad3e0587dfbea18a3ff3f3c5a1cc0b6448\" returns successfully" Dec 13 14:33:38.458124 kubelet[2290]: E1213 14:33:38.458073 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:39.156000 audit[4278]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=4278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:39.168257 kernel: kauditd_printk_skb: 339 callbacks suppressed Dec 13 14:33:39.168407 kernel: audit: type=1325 audit(1734100419.156:450): table=filter:101 family=2 entries=20 op=nft_register_rule pid=4278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:39.168449 kernel: audit: type=1300 audit(1734100419.156:450): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2acbd2e0 a2=0 a3=7ffe2acbd2cc items=0 ppid=2531 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.156000 audit[4278]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2acbd2e0 a2=0 a3=7ffe2acbd2cc items=0 ppid=2531 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.200201 kernel: audit: type=1327 audit(1734100419.156:450): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:39.200347 kernel: audit: type=1325 audit(1734100419.175:451): table=nat:102 family=2 entries=106 op=nft_register_chain pid=4278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:39.200470 kernel: audit: type=1300 audit(1734100419.175:451): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe2acbd2e0 a2=0 a3=7ffe2acbd2cc items=0 ppid=2531 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:39.175000 audit[4278]: NETFILTER_CFG table=nat:102 family=2 entries=106 op=nft_register_chain pid=4278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:39.175000 audit[4278]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe2acbd2e0 a2=0 a3=7ffe2acbd2cc items=0 ppid=2531 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:39.206241 kernel: audit: type=1327 audit(1734100419.175:451): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:39.462564 kubelet[2290]: E1213 14:33:39.462385 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:40.463680 kubelet[2290]: E1213 14:33:40.463609 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:41.046880 env[1834]: time="2024-12-13T14:33:41.046822606Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.052231 env[1834]: time="2024-12-13T14:33:41.052151402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.054846 env[1834]: time="2024-12-13T14:33:41.054807387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.057055 env[1834]: time="2024-12-13T14:33:41.057009845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.058631 env[1834]: time="2024-12-13T14:33:41.058594069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:33:41.107296 env[1834]: time="2024-12-13T14:33:41.107235114Z" level=info msg="CreateContainer within sandbox \"f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:33:41.129491 env[1834]: time="2024-12-13T14:33:41.129432533Z" level=info msg="CreateContainer within sandbox \"f5dfb7b8473a5be82b604d48b79a2efede4e682bae45786c661352f9b410eb30\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a\"" Dec 13 14:33:41.130929 env[1834]: time="2024-12-13T14:33:41.130867505Z" level=info msg="StartContainer for \"a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a\"" Dec 13 14:33:41.130932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3140290309.mount: Deactivated successfully. Dec 13 14:33:41.283622 env[1834]: time="2024-12-13T14:33:41.283560635Z" level=info msg="StartContainer for \"a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a\" returns successfully" Dec 13 14:33:41.464706 kubelet[2290]: E1213 14:33:41.464635 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:42.104907 kubelet[2290]: I1213 14:33:42.102587 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74667b956-29hxb" podStartSLOduration=2.596742279 podStartE2EDuration="14.10252543s" podCreationTimestamp="2024-12-13 14:33:28 +0000 UTC" firstStartedPulling="2024-12-13 14:33:29.554448665 +0000 UTC m=+62.691632050" lastFinishedPulling="2024-12-13 14:33:41.060231823 +0000 UTC m=+74.197415201" observedRunningTime="2024-12-13 14:33:42.102354653 +0000 UTC m=+75.239538045" watchObservedRunningTime="2024-12-13 14:33:42.10252543 +0000 UTC m=+75.239708820" Dec 13 14:33:42.104907 kubelet[2290]: I1213 14:33:42.103574 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=4.989515914 podStartE2EDuration="16.10339533s" podCreationTimestamp="2024-12-13 14:33:26 +0000 UTC" firstStartedPulling="2024-12-13 14:33:27.138734289 +0000 UTC m=+60.275917666" lastFinishedPulling="2024-12-13 14:33:38.252613691 +0000 UTC m=+71.389797082" observedRunningTime="2024-12-13 14:33:39.084544649 +0000 UTC m=+72.221728045" watchObservedRunningTime="2024-12-13 14:33:42.10339533 +0000 UTC m=+75.240578729" Dec 13 14:33:42.157949 systemd[1]: run-containerd-runc-k8s.io-a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a-runc.ScNlef.mount: Deactivated successfully. Dec 13 14:33:42.465926 kubelet[2290]: E1213 14:33:42.465870 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:43.466577 kubelet[2290]: E1213 14:33:43.466514 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:44.467746 kubelet[2290]: E1213 14:33:44.467698 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:45.468576 kubelet[2290]: E1213 14:33:45.468518 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:46.469469 kubelet[2290]: E1213 14:33:46.469425 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:47.370665 kubelet[2290]: E1213 14:33:47.370613 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:47.470245 kubelet[2290]: E1213 14:33:47.470177 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:48.471897 kubelet[2290]: E1213 14:33:48.471749 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:49.473026 kubelet[2290]: E1213 14:33:49.472949 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:50.473646 kubelet[2290]: E1213 14:33:50.473590 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:51.474035 kubelet[2290]: E1213 14:33:51.473810 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:52.474325 kubelet[2290]: E1213 14:33:52.474271 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:53.475314 kubelet[2290]: E1213 14:33:53.475260 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:54.475981 kubelet[2290]: E1213 14:33:54.475938 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:55.476908 kubelet[2290]: E1213 14:33:55.476842 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:56.477671 kubelet[2290]: E1213 14:33:56.477618 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:57.478661 kubelet[2290]: E1213 14:33:57.478610 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:58.478932 kubelet[2290]: E1213 14:33:58.478886 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:58.682094 systemd[1]: run-containerd-runc-k8s.io-e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6-runc.8Ipn5x.mount: Deactivated successfully. Dec 13 14:33:58.846567 env[1834]: time="2024-12-13T14:33:58.846374933Z" level=info msg="StopContainer for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" with timeout 5 (s)" Dec 13 14:33:58.847284 env[1834]: time="2024-12-13T14:33:58.847249552Z" level=info msg="Stop container \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" with signal terminated" Dec 13 14:33:58.901714 env[1834]: time="2024-12-13T14:33:58.895786718Z" level=info msg="shim disconnected" id=e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6 Dec 13 14:33:58.901714 env[1834]: time="2024-12-13T14:33:58.895874564Z" level=warning msg="cleaning up after shim disconnected" id=e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6 namespace=k8s.io Dec 13 14:33:58.901714 env[1834]: time="2024-12-13T14:33:58.895888983Z" level=info msg="cleaning up dead shim" Dec 13 14:33:58.900306 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6-rootfs.mount: Deactivated successfully. Dec 13 14:33:58.912285 env[1834]: time="2024-12-13T14:33:58.912230159Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4812 runtime=io.containerd.runc.v2\n" Dec 13 14:33:58.958906 systemd[1]: run-containerd-runc-k8s.io-a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a-runc.1AD7YS.mount: Deactivated successfully. Dec 13 14:33:59.188284 env[1834]: time="2024-12-13T14:33:59.188232500Z" level=info msg="StopContainer for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" returns successfully" Dec 13 14:33:59.189256 env[1834]: time="2024-12-13T14:33:59.189222931Z" level=info msg="StopPodSandbox for \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\"" Dec 13 14:33:59.189381 env[1834]: time="2024-12-13T14:33:59.189298115Z" level=info msg="Container to stop \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:33:59.189381 env[1834]: time="2024-12-13T14:33:59.189326939Z" level=info msg="Container to stop \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:33:59.189381 env[1834]: time="2024-12-13T14:33:59.189344143Z" level=info msg="Container to stop \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:33:59.222879 env[1834]: time="2024-12-13T14:33:59.222818870Z" level=info msg="shim disconnected" id=b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289 Dec 13 14:33:59.223279 env[1834]: time="2024-12-13T14:33:59.223245321Z" level=warning msg="cleaning up after shim disconnected" id=b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289 namespace=k8s.io Dec 13 14:33:59.223615 env[1834]: time="2024-12-13T14:33:59.223593396Z" level=info msg="cleaning up dead shim" Dec 13 14:33:59.236696 env[1834]: time="2024-12-13T14:33:59.236635742Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4865 runtime=io.containerd.runc.v2\n" Dec 13 14:33:59.244654 env[1834]: time="2024-12-13T14:33:59.244608049Z" level=info msg="TearDown network for sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" successfully" Dec 13 14:33:59.244654 env[1834]: time="2024-12-13T14:33:59.244648827Z" level=info msg="StopPodSandbox for \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" returns successfully" Dec 13 14:33:59.388503 kubelet[2290]: I1213 14:33:59.388396 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-flexvol-driver-host\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.388715 kubelet[2290]: I1213 14:33:59.388530 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jvbtl\" (UniqueName: \"kubernetes.io/projected/107c299f-32fc-413d-96e1-2cb26cb02b33-kube-api-access-jvbtl\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.388715 kubelet[2290]: I1213 14:33:59.388560 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-lib-calico\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.388715 kubelet[2290]: I1213 14:33:59.388588 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/107c299f-32fc-413d-96e1-2cb26cb02b33-tigera-ca-bundle\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.388715 kubelet[2290]: I1213 14:33:59.388616 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/107c299f-32fc-413d-96e1-2cb26cb02b33-node-certs\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.388715 kubelet[2290]: I1213 14:33:59.388641 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-run-calico\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.388715 kubelet[2290]: I1213 14:33:59.388665 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-bin-dir\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.389174 kubelet[2290]: I1213 14:33:59.388690 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-xtables-lock\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.389174 kubelet[2290]: I1213 14:33:59.388716 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-net-dir\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.389174 kubelet[2290]: I1213 14:33:59.388740 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-policysync\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.389174 kubelet[2290]: I1213 14:33:59.388771 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-lib-modules\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.389174 kubelet[2290]: I1213 14:33:59.388799 2290 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-log-dir\") pod \"107c299f-32fc-413d-96e1-2cb26cb02b33\" (UID: \"107c299f-32fc-413d-96e1-2cb26cb02b33\") " Dec 13 14:33:59.390939 kubelet[2290]: I1213 14:33:59.390850 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.390939 kubelet[2290]: I1213 14:33:59.390903 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.393054 kubelet[2290]: I1213 14:33:59.393015 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.393203 kubelet[2290]: I1213 14:33:59.393086 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.393203 kubelet[2290]: I1213 14:33:59.393112 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.393203 kubelet[2290]: I1213 14:33:59.393135 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-policysync" (OuterVolumeSpecName: "policysync") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.393203 kubelet[2290]: I1213 14:33:59.393158 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.393203 kubelet[2290]: I1213 14:33:59.390855 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.399628 kubelet[2290]: I1213 14:33:59.399322 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/107c299f-32fc-413d-96e1-2cb26cb02b33-kube-api-access-jvbtl" (OuterVolumeSpecName: "kube-api-access-jvbtl") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "kube-api-access-jvbtl". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:33:59.403247 kubelet[2290]: I1213 14:33:59.403205 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/107c299f-32fc-413d-96e1-2cb26cb02b33-node-certs" (OuterVolumeSpecName: "node-certs") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:33:59.403377 kubelet[2290]: I1213 14:33:59.403289 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:33:59.404493 kubelet[2290]: I1213 14:33:59.404458 2290 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/107c299f-32fc-413d-96e1-2cb26cb02b33-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "107c299f-32fc-413d-96e1-2cb26cb02b33" (UID: "107c299f-32fc-413d-96e1-2cb26cb02b33"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:33:59.428696 kubelet[2290]: I1213 14:33:59.427397 2290 topology_manager.go:215] "Topology Admit Handler" podUID="8c160ac6-4657-460a-83b3-a2e0904b7db1" podNamespace="calico-system" podName="calico-node-4n6ml" Dec 13 14:33:59.428696 kubelet[2290]: E1213 14:33:59.427569 2290 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="107c299f-32fc-413d-96e1-2cb26cb02b33" containerName="install-cni" Dec 13 14:33:59.428696 kubelet[2290]: E1213 14:33:59.427587 2290 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="107c299f-32fc-413d-96e1-2cb26cb02b33" containerName="calico-node" Dec 13 14:33:59.428696 kubelet[2290]: E1213 14:33:59.427658 2290 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="107c299f-32fc-413d-96e1-2cb26cb02b33" containerName="flexvol-driver" Dec 13 14:33:59.428696 kubelet[2290]: I1213 14:33:59.427730 2290 memory_manager.go:354] "RemoveStaleState removing state" podUID="107c299f-32fc-413d-96e1-2cb26cb02b33" containerName="calico-node" Dec 13 14:33:59.480082 kubelet[2290]: E1213 14:33:59.479934 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:33:59.489564 kubelet[2290]: I1213 14:33:59.489523 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-xtables-lock\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.489805 kubelet[2290]: I1213 14:33:59.489785 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-var-lib-calico\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.489896 kubelet[2290]: I1213 14:33:59.489824 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-cni-net-dir\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.489896 kubelet[2290]: I1213 14:33:59.489857 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-var-run-calico\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.489896 kubelet[2290]: I1213 14:33:59.489893 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-cni-bin-dir\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490038 kubelet[2290]: I1213 14:33:59.489926 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2xc2l\" (UniqueName: \"kubernetes.io/projected/8c160ac6-4657-460a-83b3-a2e0904b7db1-kube-api-access-2xc2l\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490038 kubelet[2290]: I1213 14:33:59.489957 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8c160ac6-4657-460a-83b3-a2e0904b7db1-tigera-ca-bundle\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490038 kubelet[2290]: I1213 14:33:59.489988 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-cni-log-dir\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490038 kubelet[2290]: I1213 14:33:59.490018 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-flexvol-driver-host\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490049 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-policysync\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490086 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8c160ac6-4657-460a-83b3-a2e0904b7db1-lib-modules\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490120 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8c160ac6-4657-460a-83b3-a2e0904b7db1-node-certs\") pod \"calico-node-4n6ml\" (UID: \"8c160ac6-4657-460a-83b3-a2e0904b7db1\") " pod="calico-system/calico-node-4n6ml" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490150 2290 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-xtables-lock\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490189 2290 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-net-dir\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490205 2290 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-lib-modules\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490261 kubelet[2290]: I1213 14:33:59.490220 2290 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-policysync\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490236 2290 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-log-dir\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490251 2290 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-jvbtl\" (UniqueName: \"kubernetes.io/projected/107c299f-32fc-413d-96e1-2cb26cb02b33-kube-api-access-jvbtl\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490267 2290 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-flexvol-driver-host\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490284 2290 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/107c299f-32fc-413d-96e1-2cb26cb02b33-tigera-ca-bundle\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490299 2290 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/107c299f-32fc-413d-96e1-2cb26cb02b33-node-certs\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490315 2290 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-lib-calico\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490330 2290 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-cni-bin-dir\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.490586 kubelet[2290]: I1213 14:33:59.490350 2290 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/107c299f-32fc-413d-96e1-2cb26cb02b33-var-run-calico\") on node \"172.31.21.211\" DevicePath \"\"" Dec 13 14:33:59.680241 systemd[1]: var-lib-kubelet-pods-107c299f\x2d32fc\x2d413d\x2d96e1\x2d2cb26cb02b33-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:33:59.680703 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289-rootfs.mount: Deactivated successfully. Dec 13 14:33:59.681736 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289-shm.mount: Deactivated successfully. Dec 13 14:33:59.681904 systemd[1]: var-lib-kubelet-pods-107c299f\x2d32fc\x2d413d\x2d96e1\x2d2cb26cb02b33-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:33:59.682096 systemd[1]: var-lib-kubelet-pods-107c299f\x2d32fc\x2d413d\x2d96e1\x2d2cb26cb02b33-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djvbtl.mount: Deactivated successfully. Dec 13 14:33:59.737309 env[1834]: time="2024-12-13T14:33:59.736039519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4n6ml,Uid:8c160ac6-4657-460a-83b3-a2e0904b7db1,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:59.766544 env[1834]: time="2024-12-13T14:33:59.766459672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:59.766544 env[1834]: time="2024-12-13T14:33:59.766511158Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:59.766800 env[1834]: time="2024-12-13T14:33:59.766526444Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:59.767270 env[1834]: time="2024-12-13T14:33:59.767212548Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e pid=4893 runtime=io.containerd.runc.v2 Dec 13 14:33:59.826625 env[1834]: time="2024-12-13T14:33:59.826567621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4n6ml,Uid:8c160ac6-4657-460a-83b3-a2e0904b7db1,Namespace:calico-system,Attempt:0,} returns sandbox id \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\"" Dec 13 14:33:59.829862 env[1834]: time="2024-12-13T14:33:59.829828307Z" level=info msg="CreateContainer within sandbox \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:33:59.866572 env[1834]: time="2024-12-13T14:33:59.866530064Z" level=info msg="CreateContainer within sandbox \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"505813174a19567fa10e8ac1d4eec84594e167066066f15022b261efe01328bf\"" Dec 13 14:33:59.867964 env[1834]: time="2024-12-13T14:33:59.867783395Z" level=info msg="StartContainer for \"505813174a19567fa10e8ac1d4eec84594e167066066f15022b261efe01328bf\"" Dec 13 14:33:59.956978 env[1834]: time="2024-12-13T14:33:59.956929380Z" level=info msg="StartContainer for \"505813174a19567fa10e8ac1d4eec84594e167066066f15022b261efe01328bf\" returns successfully" Dec 13 14:34:00.163372 kubelet[2290]: I1213 14:34:00.163326 2290 scope.go:117] "RemoveContainer" containerID="e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6" Dec 13 14:34:00.167630 env[1834]: time="2024-12-13T14:34:00.167587999Z" level=info msg="RemoveContainer for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\"" Dec 13 14:34:00.187700 env[1834]: time="2024-12-13T14:34:00.187649168Z" level=info msg="RemoveContainer for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" returns successfully" Dec 13 14:34:00.199563 kubelet[2290]: I1213 14:34:00.199530 2290 scope.go:117] "RemoveContainer" containerID="9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201" Dec 13 14:34:00.204100 env[1834]: time="2024-12-13T14:34:00.204061118Z" level=info msg="RemoveContainer for \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\"" Dec 13 14:34:00.218564 env[1834]: time="2024-12-13T14:34:00.218483971Z" level=info msg="RemoveContainer for \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\" returns successfully" Dec 13 14:34:00.220703 kubelet[2290]: I1213 14:34:00.220669 2290 scope.go:117] "RemoveContainer" containerID="d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807" Dec 13 14:34:00.229747 env[1834]: time="2024-12-13T14:34:00.229694358Z" level=info msg="RemoveContainer for \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\"" Dec 13 14:34:00.238081 env[1834]: time="2024-12-13T14:34:00.238020126Z" level=info msg="RemoveContainer for \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\" returns successfully" Dec 13 14:34:00.239386 kubelet[2290]: I1213 14:34:00.239192 2290 scope.go:117] "RemoveContainer" containerID="e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6" Dec 13 14:34:00.240696 env[1834]: time="2024-12-13T14:34:00.240599210Z" level=error msg="ContainerStatus for \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\": not found" Dec 13 14:34:00.249504 kubelet[2290]: E1213 14:34:00.249475 2290 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\": not found" containerID="e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6" Dec 13 14:34:00.249674 kubelet[2290]: I1213 14:34:00.249528 2290 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6"} err="failed to get container status \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\": rpc error: code = NotFound desc = an error occurred when try to find container \"e760e0b20991fdae51eff0f951247996e343552c253b11b9f1582d1829dc90e6\": not found" Dec 13 14:34:00.249674 kubelet[2290]: I1213 14:34:00.249545 2290 scope.go:117] "RemoveContainer" containerID="9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201" Dec 13 14:34:00.249957 env[1834]: time="2024-12-13T14:34:00.249881603Z" level=error msg="ContainerStatus for \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\": not found" Dec 13 14:34:00.250508 kubelet[2290]: E1213 14:34:00.250476 2290 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\": not found" containerID="9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201" Dec 13 14:34:00.250668 kubelet[2290]: I1213 14:34:00.250531 2290 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201"} err="failed to get container status \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\": rpc error: code = NotFound desc = an error occurred when try to find container \"9e5f0b062b5faf1e010a12f17fe64532c9dd4b773eade545720e8a2560e2a201\": not found" Dec 13 14:34:00.250668 kubelet[2290]: I1213 14:34:00.250547 2290 scope.go:117] "RemoveContainer" containerID="d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807" Dec 13 14:34:00.250975 env[1834]: time="2024-12-13T14:34:00.250893970Z" level=error msg="ContainerStatus for \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\": not found" Dec 13 14:34:00.251090 kubelet[2290]: E1213 14:34:00.251067 2290 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\": not found" containerID="d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807" Dec 13 14:34:00.251260 kubelet[2290]: I1213 14:34:00.251109 2290 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807"} err="failed to get container status \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\": rpc error: code = NotFound desc = an error occurred when try to find container \"d63d95a89e1331703f2c829c89881917deccab264adcbc749dd7c3c8da642807\": not found" Dec 13 14:34:00.289709 env[1834]: time="2024-12-13T14:34:00.289651039Z" level=info msg="shim disconnected" id=505813174a19567fa10e8ac1d4eec84594e167066066f15022b261efe01328bf Dec 13 14:34:00.290044 env[1834]: time="2024-12-13T14:34:00.289720057Z" level=warning msg="cleaning up after shim disconnected" id=505813174a19567fa10e8ac1d4eec84594e167066066f15022b261efe01328bf namespace=k8s.io Dec 13 14:34:00.290044 env[1834]: time="2024-12-13T14:34:00.289733901Z" level=info msg="cleaning up dead shim" Dec 13 14:34:00.325195 env[1834]: time="2024-12-13T14:34:00.324941842Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4977 runtime=io.containerd.runc.v2\n" Dec 13 14:34:00.481291 kubelet[2290]: E1213 14:34:00.481137 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:00.671724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3933169805.mount: Deactivated successfully. Dec 13 14:34:01.168863 env[1834]: time="2024-12-13T14:34:01.168817340Z" level=info msg="CreateContainer within sandbox \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:34:01.191809 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount183341567.mount: Deactivated successfully. Dec 13 14:34:01.205781 env[1834]: time="2024-12-13T14:34:01.205720517Z" level=info msg="CreateContainer within sandbox \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb\"" Dec 13 14:34:01.206455 env[1834]: time="2024-12-13T14:34:01.206388347Z" level=info msg="StartContainer for \"2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb\"" Dec 13 14:34:01.398540 env[1834]: time="2024-12-13T14:34:01.398346449Z" level=info msg="StartContainer for \"2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb\" returns successfully" Dec 13 14:34:01.482109 kubelet[2290]: E1213 14:34:01.481847 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:01.613243 kubelet[2290]: I1213 14:34:01.612857 2290 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="107c299f-32fc-413d-96e1-2cb26cb02b33" path="/var/lib/kubelet/pods/107c299f-32fc-413d-96e1-2cb26cb02b33/volumes" Dec 13 14:34:01.672065 systemd[1]: run-containerd-runc-k8s.io-2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb-runc.QQbEBC.mount: Deactivated successfully. Dec 13 14:34:02.482904 kubelet[2290]: E1213 14:34:02.482856 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:03.484188 kubelet[2290]: E1213 14:34:03.484129 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:03.732707 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb-rootfs.mount: Deactivated successfully. Dec 13 14:34:03.749651 env[1834]: time="2024-12-13T14:34:03.749406684Z" level=info msg="shim disconnected" id=2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb Dec 13 14:34:03.749651 env[1834]: time="2024-12-13T14:34:03.749578097Z" level=warning msg="cleaning up after shim disconnected" id=2c739a9f514c7081864b4f35d81dc42035199ac27207b1c5834330d6fd678ccb namespace=k8s.io Dec 13 14:34:03.749651 env[1834]: time="2024-12-13T14:34:03.749596159Z" level=info msg="cleaning up dead shim" Dec 13 14:34:03.759999 env[1834]: time="2024-12-13T14:34:03.759944297Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5041 runtime=io.containerd.runc.v2\n" Dec 13 14:34:04.297900 env[1834]: time="2024-12-13T14:34:04.297848229Z" level=info msg="CreateContainer within sandbox \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:34:04.324729 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1603961055.mount: Deactivated successfully. Dec 13 14:34:04.335609 env[1834]: time="2024-12-13T14:34:04.335547017Z" level=info msg="CreateContainer within sandbox \"96493f45ba2a5e5e91ac18de910a6b04755aaf92b4599cabf142a3333b4e107e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9d6f942d42b937f09436bd8de815038f2a777fcc11e84a42445176a6ed68e8b2\"" Dec 13 14:34:04.336427 env[1834]: time="2024-12-13T14:34:04.336394144Z" level=info msg="StartContainer for \"9d6f942d42b937f09436bd8de815038f2a777fcc11e84a42445176a6ed68e8b2\"" Dec 13 14:34:04.404701 env[1834]: time="2024-12-13T14:34:04.403915693Z" level=info msg="StartContainer for \"9d6f942d42b937f09436bd8de815038f2a777fcc11e84a42445176a6ed68e8b2\" returns successfully" Dec 13 14:34:04.484622 kubelet[2290]: E1213 14:34:04.484486 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:05.238968 systemd[1]: run-containerd-runc-k8s.io-9d6f942d42b937f09436bd8de815038f2a777fcc11e84a42445176a6ed68e8b2-runc.WHGl9D.mount: Deactivated successfully. Dec 13 14:34:05.485058 kubelet[2290]: E1213 14:34:05.485012 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:05.955000 audit[5179]: AVC avc: denied { write } for pid=5179 comm="tee" name="fd" dev="proc" ino=27573 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:05.968911 kernel: audit: type=1400 audit(1734100445.955:452): avc: denied { write } for pid=5179 comm="tee" name="fd" dev="proc" ino=27573 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:05.969096 kernel: audit: type=1300 audit(1734100445.955:452): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa7b71a10 a2=241 a3=1b6 items=1 ppid=5156 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.955000 audit[5179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa7b71a10 a2=241 a3=1b6 items=1 ppid=5156 pid=5179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.955000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:34:05.998763 kernel: audit: type=1307 audit(1734100445.955:452): cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:34:05.998951 kernel: audit: type=1302 audit(1734100445.955:452): item=0 name="/dev/fd/63" inode=27559 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:05.955000 audit: PATH item=0 name="/dev/fd/63" inode=27559 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:05.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.004194 kernel: audit: type=1327 audit(1734100445.955:452): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:05.998000 audit[5201]: AVC avc: denied { write } for pid=5201 comm="tee" name="fd" dev="proc" ino=27590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:06.027289 kernel: audit: type=1400 audit(1734100445.998:453): avc: denied { write } for pid=5201 comm="tee" name="fd" dev="proc" ino=27590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:05.998000 audit[5201]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe45d19a1f a2=241 a3=1b6 items=1 ppid=5147 pid=5201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.045575 kernel: audit: type=1300 audit(1734100445.998:453): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe45d19a1f a2=241 a3=1b6 items=1 ppid=5147 pid=5201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.045826 kernel: audit: type=1307 audit(1734100445.998:453): cwd="/etc/service/enabled/felix/log" Dec 13 14:34:05.998000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:34:05.998000 audit: PATH item=0 name="/dev/fd/63" inode=27581 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:06.060206 kernel: audit: type=1302 audit(1734100445.998:453): item=0 name="/dev/fd/63" inode=27581 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:05.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.079193 kernel: audit: type=1327 audit(1734100445.998:453): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:05.998000 audit[5195]: AVC avc: denied { write } for pid=5195 comm="tee" name="fd" dev="proc" ino=27594 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:05.998000 audit[5195]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3889da21 a2=241 a3=1b6 items=1 ppid=5152 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.998000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:34:05.998000 audit: PATH item=0 name="/dev/fd/63" inode=27570 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:05.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.011000 audit[5205]: AVC avc: denied { write } for pid=5205 comm="tee" name="fd" dev="proc" ino=28059 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:06.011000 audit[5205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbc358a20 a2=241 a3=1b6 items=1 ppid=5155 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.011000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:34:06.011000 audit: PATH item=0 name="/dev/fd/63" inode=28056 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:06.011000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.021000 audit[5208]: AVC avc: denied { write } for pid=5208 comm="tee" name="fd" dev="proc" ino=27600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:06.021000 audit[5208]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8bc1fa1f a2=241 a3=1b6 items=1 ppid=5157 pid=5208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.021000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:34:06.021000 audit: PATH item=0 name="/dev/fd/63" inode=27585 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:06.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.025000 audit[5203]: AVC avc: denied { write } for pid=5203 comm="tee" name="fd" dev="proc" ino=27602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:06.025000 audit[5203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8c562a1f a2=241 a3=1b6 items=1 ppid=5150 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.025000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:34:06.025000 audit: PATH item=0 name="/dev/fd/63" inode=27584 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:06.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.045000 audit[5210]: AVC avc: denied { write } for pid=5210 comm="tee" name="fd" dev="proc" ino=27607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:06.045000 audit[5210]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc42964a0f a2=241 a3=1b6 items=1 ppid=5149 pid=5210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.045000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:34:06.045000 audit: PATH item=0 name="/dev/fd/63" inode=27586 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:06.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:06.260150 systemd[1]: run-containerd-runc-k8s.io-9d6f942d42b937f09436bd8de815038f2a777fcc11e84a42445176a6ed68e8b2-runc.cujpAP.mount: Deactivated successfully. Dec 13 14:34:06.486372 kubelet[2290]: E1213 14:34:06.486296 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.493000 audit: BPF prog-id=42 op=LOAD Dec 13 14:34:06.493000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffceba905f0 a2=98 a3=3 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.496000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.496000 audit: BPF prog-id=43 op=LOAD Dec 13 14:34:06.496000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffceba903d0 a2=74 a3=540051 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.498000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.498000 audit: BPF prog-id=44 op=LOAD Dec 13 14:34:06.498000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffceba90400 a2=94 a3=2 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.498000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.501000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit: BPF prog-id=45 op=LOAD Dec 13 14:34:06.664000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffceba902c0 a2=40 a3=1 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.664000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:34:06.664000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.664000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffceba90390 a2=50 a3=7ffceba90470 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.664000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceba902d0 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceba90300 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceba90210 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceba90320 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceba90300 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceba902f0 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceba90320 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceba90300 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceba90320 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceba902f0 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.677000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.677000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceba90360 a2=28 a3=0 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffceba90110 a2=50 a3=1 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit: BPF prog-id=46 op=LOAD Dec 13 14:34:06.678000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffceba90110 a2=94 a3=5 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.678000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffceba901c0 a2=50 a3=1 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffceba902e0 a2=4 a3=38 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { confidentiality } for pid=5279 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:06.678000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffceba90330 a2=94 a3=6 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.678000 audit[5279]: AVC avc: denied { confidentiality } for pid=5279 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:06.678000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffceba8fae0 a2=94 a3=83 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.678000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { perfmon } for pid=5279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.679000 audit[5279]: AVC avc: denied { confidentiality } for pid=5279 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:06.679000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffceba8fae0 a2=94 a3=83 items=0 ppid=5148 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.679000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit: BPF prog-id=47 op=LOAD Dec 13 14:34:06.709000 audit[5282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3d63daa0 a2=98 a3=1999999999999999 items=0 ppid=5148 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.709000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:06.709000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit: BPF prog-id=48 op=LOAD Dec 13 14:34:06.709000 audit[5282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3d63d980 a2=74 a3=ffff items=0 ppid=5148 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.709000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:06.709000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { perfmon } for pid=5282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit[5282]: AVC avc: denied { bpf } for pid=5282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.709000 audit: BPF prog-id=49 op=LOAD Dec 13 14:34:06.709000 audit[5282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3d63d9c0 a2=40 a3=7fff3d63dba0 items=0 ppid=5148 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.709000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:06.709000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit: BPF prog-id=50 op=LOAD Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe07be8f70 a2=98 a3=ffffffff items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.821000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit: BPF prog-id=51 op=LOAD Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe07be8d80 a2=74 a3=540051 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.821000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit: BPF prog-id=52 op=LOAD Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe07be8db0 a2=94 a3=2 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.821000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe07be8c80 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe07be8cb0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe07be8bc0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.821000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.821000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe07be8cd0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.822000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.822000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe07be8cb0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.822000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.822000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe07be8ca0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe07be8cd0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe07be8cb0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe07be8cd0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe07be8ca0 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe07be8d10 a2=28 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.827000 audit: BPF prog-id=53 op=LOAD Dec 13 14:34:06.827000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe07be8b80 a2=40 a3=0 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.827000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe07be8b70 a2=50 a3=2800 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe07be8b70 a2=50 a3=2800 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit: BPF prog-id=54 op=LOAD Dec 13 14:34:06.837000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe07be8390 a2=94 a3=2 items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.837000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { perfmon } for pid=5305 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit[5305]: AVC avc: denied { bpf } for pid=5305 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.837000 audit: BPF prog-id=55 op=LOAD Dec 13 14:34:06.837000 audit[5305]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe07be8490 a2=94 a3=2d items=0 ppid=5148 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.852000 audit: BPF prog-id=56 op=LOAD Dec 13 14:34:06.852000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaa3ccd80 a2=98 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:06.852000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit: BPF prog-id=57 op=LOAD Dec 13 14:34:06.856000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdaa3ccb60 a2=74 a3=540051 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:06.856000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.856000 audit: BPF prog-id=58 op=LOAD Dec 13 14:34:06.856000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdaa3ccb90 a2=94 a3=2 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:06.859000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:34:06.824857 (udev-worker)[5306]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:34:06.826319 (udev-worker)[5307]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit: BPF prog-id=59 op=LOAD Dec 13 14:34:07.074000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdaa3cca50 a2=40 a3=1 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.074000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.074000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:34:07.074000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.074000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdaa3ccb20 a2=50 a3=7ffdaa3ccc00 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.074000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaa3cca60 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaa3cca90 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaa3cc9a0 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaa3ccab0 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaa3cca90 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaa3cca80 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaa3ccab0 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.095000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.095000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaa3cca90 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaa3ccab0 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaa3cca80 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaa3ccaf0 a2=28 a3=0 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdaa3cc8a0 a2=50 a3=1 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit: BPF prog-id=60 op=LOAD Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaa3cc8a0 a2=94 a3=5 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdaa3cc950 a2=50 a3=1 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdaa3cca70 a2=4 a3=38 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.096000 audit[5311]: AVC avc: denied { confidentiality } for pid=5311 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:07.096000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdaa3ccac0 a2=94 a3=6 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { confidentiality } for pid=5311 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:07.097000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdaa3cc270 a2=94 a3=83 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { perfmon } for pid=5311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.097000 audit[5311]: AVC avc: denied { confidentiality } for pid=5311 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:07.097000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdaa3cc270 a2=94 a3=83 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.097000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.098000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.098000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaa3cdcb0 a2=10 a3=f1f00800 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.098000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.098000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaa3cdb50 a2=10 a3=3 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.098000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.098000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaa3cdaf0 a2=10 a3=3 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.098000 audit[5311]: AVC avc: denied { bpf } for pid=5311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:07.098000 audit[5311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaa3cdaf0 a2=10 a3=7 items=0 ppid=5148 pid=5311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:07.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:07.106000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:34:07.370630 kubelet[2290]: E1213 14:34:07.370512 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:07.487437 kubelet[2290]: E1213 14:34:07.487384 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:08.487815 kubelet[2290]: E1213 14:34:08.487760 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:09.488132 kubelet[2290]: E1213 14:34:09.488077 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:10.488952 kubelet[2290]: E1213 14:34:10.488892 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:10.957677 kubelet[2290]: I1213 14:34:10.957588 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4n6ml" podStartSLOduration=11.95754786 podStartE2EDuration="11.95754786s" podCreationTimestamp="2024-12-13 14:33:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:05.254525137 +0000 UTC m=+98.391708556" watchObservedRunningTime="2024-12-13 14:34:10.95754786 +0000 UTC m=+104.094731295" Dec 13 14:34:10.959330 kubelet[2290]: I1213 14:34:10.959292 2290 topology_manager.go:215] "Topology Admit Handler" podUID="1955b51e-74c2-48ca-84c2-c06c4dc4bb82" podNamespace="default" podName="test-pod-1" Dec 13 14:34:11.142424 kubelet[2290]: I1213 14:34:11.142386 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-65bc9c84-a51a-4b97-bd93-d28081a9eaf2\" (UniqueName: \"kubernetes.io/nfs/1955b51e-74c2-48ca-84c2-c06c4dc4bb82-pvc-65bc9c84-a51a-4b97-bd93-d28081a9eaf2\") pod \"test-pod-1\" (UID: \"1955b51e-74c2-48ca-84c2-c06c4dc4bb82\") " pod="default/test-pod-1" Dec 13 14:34:11.142603 kubelet[2290]: I1213 14:34:11.142450 2290 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vm82z\" (UniqueName: \"kubernetes.io/projected/1955b51e-74c2-48ca-84c2-c06c4dc4bb82-kube-api-access-vm82z\") pod \"test-pod-1\" (UID: \"1955b51e-74c2-48ca-84c2-c06c4dc4bb82\") " pod="default/test-pod-1" Dec 13 14:34:11.328412 kernel: Failed to create system directory netfs Dec 13 14:34:11.329264 kernel: kauditd_printk_skb: 493 callbacks suppressed Dec 13 14:34:11.329343 kernel: audit: type=1400 audit(1734100451.302:550): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.329380 kernel: Failed to create system directory netfs Dec 13 14:34:11.329404 kernel: audit: type=1400 audit(1734100451.302:550): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.329436 kernel: Failed to create system directory netfs Dec 13 14:34:11.341350 kernel: audit: type=1400 audit(1734100451.302:550): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.341468 kernel: Failed to create system directory netfs Dec 13 14:34:11.302000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.302000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.302000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.353871 kernel: audit: type=1400 audit(1734100451.302:550): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.302000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.302000 audit[5348]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a3497585e0 a1=153bc a2=55a326c222b0 a3=5 items=0 ppid=9 pid=5348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.361297 kernel: audit: type=1300 audit(1734100451.302:550): arch=c000003e syscall=175 success=yes exit=0 a0=55a3497585e0 a1=153bc a2=55a326c222b0 a3=5 items=0 ppid=9 pid=5348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.302000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:11.365196 kernel: audit: type=1327 audit(1734100451.302:550): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:11.376688 kernel: Failed to create system directory fscache Dec 13 14:34:11.376807 kernel: audit: type=1400 audit(1734100451.367:551): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.376862 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.381647 kernel: audit: type=1400 audit(1734100451.367:551): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.381764 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.387795 kernel: Failed to create system directory fscache Dec 13 14:34:11.387918 kernel: audit: type=1400 audit(1734100451.367:551): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.387948 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.392150 kernel: audit: type=1400 audit(1734100451.367:551): avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.392279 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.393907 kernel: Failed to create system directory fscache Dec 13 14:34:11.393965 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.395632 kernel: Failed to create system directory fscache Dec 13 14:34:11.395677 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.397357 kernel: Failed to create system directory fscache Dec 13 14:34:11.397403 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.399003 kernel: Failed to create system directory fscache Dec 13 14:34:11.400268 kernel: Failed to create system directory fscache Dec 13 14:34:11.367000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.367000 audit[5348]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a34996d9c0 a1=4c0fc a2=55a326c222b0 a3=5 items=0 ppid=9 pid=5348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.403186 kernel: FS-Cache: Loaded Dec 13 14:34:11.367000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.449379 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.449441 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.449467 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.451776 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.451848 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.453630 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.453684 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.455507 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.455580 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.457255 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.457296 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.458234 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.460088 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.460137 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.461651 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.461697 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.463428 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.463492 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.465234 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.465279 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.466249 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.468826 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.468871 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.468896 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.470663 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.470711 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.472539 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.472585 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.474542 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.474599 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.476538 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.476603 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.478238 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.478281 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.480096 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.480992 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.481039 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.482767 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.482816 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.484628 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.485558 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.485648 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.487427 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.487507 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.489889 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.489940 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.490757 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.490801 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.491004 kubelet[2290]: E1213 14:34:11.490979 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.492429 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.492499 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.494881 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.494920 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.494956 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.496497 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.496547 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.498293 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.498335 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.500112 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.500153 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.501968 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.502145 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.503764 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.503818 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.505515 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.505571 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.507237 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.507300 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.508881 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.508927 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.510682 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.510761 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.512696 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.512745 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.514401 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.514462 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.516417 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.516497 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.518539 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.518603 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.520503 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.520543 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.523033 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.523070 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.523103 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.524875 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.524951 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.526659 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.526703 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.529979 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.530073 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.532237 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.532326 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.534371 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.534419 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.536293 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.536334 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.539013 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.539239 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.539277 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.540899 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.540947 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.542549 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.542588 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.544319 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.544363 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.545249 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.546890 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.546923 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.548705 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.548785 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.550550 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.550588 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.553024 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.553096 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.553126 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.554933 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.554995 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.556004 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.557703 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.557744 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.559535 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.559577 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.561390 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.561435 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.563004 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.563056 kernel: Failed to create system directory sunrpc Dec 13 14:34:11.430000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.575448 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:34:11.575588 kernel: RPC: Registered udp transport module. Dec 13 14:34:11.575616 kernel: RPC: Registered tcp transport module. Dec 13 14:34:11.575644 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:34:11.430000 audit[5348]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a3499b9ad0 a1=1a7f1c a2=55a326c222b0 a3=5 items=6 ppid=9 pid=5348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.430000 audit: CWD cwd="/" Dec 13 14:34:11.430000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:11.430000 audit: PATH item=1 name=(null) inode=28978 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:11.430000 audit: PATH item=2 name=(null) inode=28978 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:11.430000 audit: PATH item=3 name=(null) inode=28979 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:11.430000 audit: PATH item=4 name=(null) inode=28978 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:11.430000 audit: PATH item=5 name=(null) inode=28980 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:11.430000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.630316 kernel: Failed to create system directory nfs Dec 13 14:34:11.634430 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.636861 kernel: Failed to create system directory nfs Dec 13 14:34:11.636909 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.637812 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.638751 kernel: Failed to create system directory nfs Dec 13 14:34:11.638805 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.640559 kernel: Failed to create system directory nfs Dec 13 14:34:11.640598 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.642455 kernel: Failed to create system directory nfs Dec 13 14:34:11.642512 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.644409 kernel: Failed to create system directory nfs Dec 13 14:34:11.644458 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.646797 kernel: Failed to create system directory nfs Dec 13 14:34:11.646829 kernel: Failed to create system directory nfs Dec 13 14:34:11.646853 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.648433 kernel: Failed to create system directory nfs Dec 13 14:34:11.648479 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.651513 kernel: Failed to create system directory nfs Dec 13 14:34:11.651571 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.653183 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.654285 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.655237 kernel: Failed to create system directory nfs Dec 13 14:34:11.655296 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.657800 kernel: Failed to create system directory nfs Dec 13 14:34:11.657858 kernel: Failed to create system directory nfs Dec 13 14:34:11.657884 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.659488 kernel: Failed to create system directory nfs Dec 13 14:34:11.659539 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.661199 kernel: Failed to create system directory nfs Dec 13 14:34:11.661246 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.662771 kernel: Failed to create system directory nfs Dec 13 14:34:11.662819 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.664337 kernel: Failed to create system directory nfs Dec 13 14:34:11.664399 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.666932 kernel: Failed to create system directory nfs Dec 13 14:34:11.666987 kernel: Failed to create system directory nfs Dec 13 14:34:11.667013 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.668555 kernel: Failed to create system directory nfs Dec 13 14:34:11.668678 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.670372 kernel: Failed to create system directory nfs Dec 13 14:34:11.670422 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.672805 kernel: Failed to create system directory nfs Dec 13 14:34:11.672915 kernel: Failed to create system directory nfs Dec 13 14:34:11.672962 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.674630 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.675604 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.676610 kernel: Failed to create system directory nfs Dec 13 14:34:11.676663 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.678351 kernel: Failed to create system directory nfs Dec 13 14:34:11.678413 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.680888 kernel: Failed to create system directory nfs Dec 13 14:34:11.680949 kernel: Failed to create system directory nfs Dec 13 14:34:11.680976 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.682545 kernel: Failed to create system directory nfs Dec 13 14:34:11.682611 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.684227 kernel: Failed to create system directory nfs Dec 13 14:34:11.684271 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.685881 kernel: Failed to create system directory nfs Dec 13 14:34:11.685930 kernel: Failed to create system directory nfs Dec 13 14:34:11.615000 audit[5348]: AVC avc: denied { confidentiality } for pid=5348 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.710252 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:34:11.615000 audit[5348]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a349bda700 a1=16e97c a2=55a326c222b0 a3=5 items=0 ppid=9 pid=5348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.615000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.793768 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.793870 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.793919 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.797688 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.797776 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.800153 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.800249 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.807304 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.807398 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.809180 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.809233 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.811101 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.811181 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.813128 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.813205 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.815664 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.815718 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.818176 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.818318 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.820106 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.820149 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.821731 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.823788 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.823843 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.825370 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.825421 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.827611 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.827679 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.829501 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.829564 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.831893 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.831930 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.831956 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.833590 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.833650 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.835366 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.835429 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.837924 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.837970 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.837996 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.839397 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.839436 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.840182 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.841766 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.841809 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.843744 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.843812 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.845338 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.845405 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.846851 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.846894 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.848772 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.848838 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.850426 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.850473 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.852000 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.852045 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.853594 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.853632 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.855315 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.855355 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.856965 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.857005 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.858504 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.858556 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.860873 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.860971 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.860997 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.862472 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.862531 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.864758 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.864794 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.864834 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.866313 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.866351 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.868027 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.868075 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.869784 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.869823 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.871497 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.871542 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.873704 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.873743 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.873783 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.875483 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.875519 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.877239 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.877281 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.879606 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.879656 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.888294 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.888558 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.888617 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.888644 kernel: Failed to create system directory nfs4 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:11.743000 audit[5353]: AVC avc: denied { confidentiality } for pid=5353 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.060998 kernel: NFS: Registering the id_resolver key type Dec 13 14:34:12.061295 kernel: Key type id_resolver registered Dec 13 14:34:12.061343 kernel: Key type id_legacy registered Dec 13 14:34:11.743000 audit[5353]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f12089ee010 a1=208de4 a2=56412d00c2b0 a3=5 items=0 ppid=9 pid=5353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.743000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.079454 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.079578 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.079609 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.081911 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.081957 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.081981 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.083424 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.083475 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.084197 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.085883 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.085936 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.087613 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.087669 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.089996 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.090055 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.090082 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.091560 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.091598 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.093952 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.094005 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.094031 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.094744 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.095624 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.097267 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.097331 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.072000 audit[5355]: AVC avc: denied { confidentiality } for pid=5355 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:12.098788 kernel: Failed to create system directory rpcgss Dec 13 14:34:12.072000 audit[5355]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd2f1a2c010 a1=70af4 a2=5565587692b0 a3=5 items=0 ppid=9 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.072000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:34:12.125025 nfsidmap[5361]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:34:12.129403 nfsidmap[5362]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:34:12.141000 audit[2074]: AVC avc: denied { watch_reads } for pid=2074 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:12.141000 audit[2074]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=557161663150 a2=10 a3=f58703d0632265e3 items=0 ppid=1 pid=2074 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.141000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:34:12.141000 audit[2074]: AVC avc: denied { watch_reads } for pid=2074 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:12.141000 audit[2074]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=557161663150 a2=10 a3=f58703d0632265e3 items=0 ppid=1 pid=2074 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.141000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:34:12.141000 audit[2074]: AVC avc: denied { watch_reads } for pid=2074 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:12.141000 audit[2074]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=557161663150 a2=10 a3=f58703d0632265e3 items=0 ppid=1 pid=2074 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.141000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:34:12.143000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:12.143000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:12.143000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:34:12.165851 env[1834]: time="2024-12-13T14:34:12.165705104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1955b51e-74c2-48ca-84c2-c06c4dc4bb82,Namespace:default,Attempt:0,}" Dec 13 14:34:12.432571 systemd-networkd[1513]: cali5ec59c6bf6e: Link UP Dec 13 14:34:12.435114 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:12.435433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:34:12.435663 systemd-networkd[1513]: cali5ec59c6bf6e: Gained carrier Dec 13 14:34:12.437351 (udev-worker)[5349]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.319 [INFO][5366] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.21.211-k8s-test--pod--1-eth0 default 1955b51e-74c2-48ca-84c2-c06c4dc4bb82 1497 0 2024-12-13 14:33:28 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.21.211 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.323 [INFO][5366] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.372 [INFO][5384] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" HandleID="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Workload="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.384 [INFO][5384] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" HandleID="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Workload="172.31.21.211-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00028ebd0), Attrs:map[string]string{"namespace":"default", "node":"172.31.21.211", "pod":"test-pod-1", "timestamp":"2024-12-13 14:34:12.372806007 +0000 UTC"}, Hostname:"172.31.21.211", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.384 [INFO][5384] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.384 [INFO][5384] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.384 [INFO][5384] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.21.211' Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.387 [INFO][5384] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.393 [INFO][5384] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.399 [INFO][5384] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.402 [INFO][5384] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.405 [INFO][5384] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.405 [INFO][5384] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.408 [INFO][5384] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6 Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.414 [INFO][5384] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.425 [INFO][5384] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.69/26] block=192.168.113.64/26 handle="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.425 [INFO][5384] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.69/26] handle="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" host="172.31.21.211" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.425 [INFO][5384] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.426 [INFO][5384] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.69/26] IPv6=[] ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" HandleID="k8s-pod-network.9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Workload="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.461281 env[1834]: 2024-12-13 14:34:12.429 [INFO][5366] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1955b51e-74c2-48ca-84c2-c06c4dc4bb82", ResourceVersion:"1497", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:12.462964 env[1834]: 2024-12-13 14:34:12.429 [INFO][5366] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.69/32] ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.462964 env[1834]: 2024-12-13 14:34:12.429 [INFO][5366] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.462964 env[1834]: 2024-12-13 14:34:12.435 [INFO][5366] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.462964 env[1834]: 2024-12-13 14:34:12.436 [INFO][5366] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.21.211-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1955b51e-74c2-48ca-84c2-c06c4dc4bb82", ResourceVersion:"1497", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.21.211", ContainerID:"9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e2:b1:ab:58:e2:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:12.462964 env[1834]: 2024-12-13 14:34:12.448 [INFO][5366] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.21.211-k8s-test--pod--1-eth0" Dec 13 14:34:12.473000 audit[5394]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=5394 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:12.473000 audit[5394]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7fff5086b0e0 a2=0 a3=7fff5086b0cc items=0 ppid=5148 pid=5394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:12.492715 kubelet[2290]: E1213 14:34:12.492673 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:12.547280 env[1834]: time="2024-12-13T14:34:12.547076110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:12.547280 env[1834]: time="2024-12-13T14:34:12.547234475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:12.547648 env[1834]: time="2024-12-13T14:34:12.547599203Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:12.547986 env[1834]: time="2024-12-13T14:34:12.547933215Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6 pid=5411 runtime=io.containerd.runc.v2 Dec 13 14:34:12.651043 env[1834]: time="2024-12-13T14:34:12.650529629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1955b51e-74c2-48ca-84c2-c06c4dc4bb82,Namespace:default,Attempt:0,} returns sandbox id \"9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6\"" Dec 13 14:34:12.662030 env[1834]: time="2024-12-13T14:34:12.661984721Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:34:12.963008 env[1834]: time="2024-12-13T14:34:12.962959253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.965668 env[1834]: time="2024-12-13T14:34:12.965623844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.968433 env[1834]: time="2024-12-13T14:34:12.968392621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.976158 env[1834]: time="2024-12-13T14:34:12.976111505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.977069 env[1834]: time="2024-12-13T14:34:12.977026349Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:34:12.982556 env[1834]: time="2024-12-13T14:34:12.982514879Z" level=info msg="CreateContainer within sandbox \"9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:34:13.013244 env[1834]: time="2024-12-13T14:34:13.013195928Z" level=info msg="CreateContainer within sandbox \"9bef959aeb3a4a950809ff9f9870a747a27d8d34a552b0bd348cd3e9ee0fcaf6\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"cd3e3c4dba2a563005a5bc8d4143d18b1a79fc06e422393d06f4524d800cf34c\"" Dec 13 14:34:13.014279 env[1834]: time="2024-12-13T14:34:13.014193962Z" level=info msg="StartContainer for \"cd3e3c4dba2a563005a5bc8d4143d18b1a79fc06e422393d06f4524d800cf34c\"" Dec 13 14:34:13.100139 env[1834]: time="2024-12-13T14:34:13.100090956Z" level=info msg="StartContainer for \"cd3e3c4dba2a563005a5bc8d4143d18b1a79fc06e422393d06f4524d800cf34c\" returns successfully" Dec 13 14:34:13.252233 kubelet[2290]: I1213 14:34:13.251330 2290 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=44.935478688 podStartE2EDuration="45.251271568s" podCreationTimestamp="2024-12-13 14:33:28 +0000 UTC" firstStartedPulling="2024-12-13 14:34:12.661669646 +0000 UTC m=+105.798853019" lastFinishedPulling="2024-12-13 14:34:12.977462514 +0000 UTC m=+106.114645899" observedRunningTime="2024-12-13 14:34:13.250275452 +0000 UTC m=+106.387458848" watchObservedRunningTime="2024-12-13 14:34:13.251271568 +0000 UTC m=+106.388454964" Dec 13 14:34:13.492881 kubelet[2290]: E1213 14:34:13.492833 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:14.423423 systemd-networkd[1513]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:34:14.494547 kubelet[2290]: E1213 14:34:14.493619 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:15.495781 kubelet[2290]: E1213 14:34:15.495726 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:16.496657 kubelet[2290]: E1213 14:34:16.496603 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:17.497570 kubelet[2290]: E1213 14:34:17.497533 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:18.499143 kubelet[2290]: E1213 14:34:18.498991 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:19.500067 kubelet[2290]: E1213 14:34:19.499958 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:20.500316 kubelet[2290]: E1213 14:34:20.500263 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:21.501148 kubelet[2290]: E1213 14:34:21.501098 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:22.501890 kubelet[2290]: E1213 14:34:22.501837 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:23.502636 kubelet[2290]: E1213 14:34:23.502590 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:23.633090 amazon-ssm-agent[1813]: 2024-12-13 14:34:23 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:34:24.503373 kubelet[2290]: E1213 14:34:24.503332 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:25.504371 kubelet[2290]: E1213 14:34:25.504324 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:26.505186 kubelet[2290]: E1213 14:34:26.505128 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:27.369965 kubelet[2290]: E1213 14:34:27.369914 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:27.505582 kubelet[2290]: E1213 14:34:27.505543 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:28.510155 kubelet[2290]: E1213 14:34:28.510096 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:28.634934 env[1834]: time="2024-12-13T14:34:28.634889805Z" level=info msg="StopPodSandbox for \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\"" Dec 13 14:34:28.635727 env[1834]: time="2024-12-13T14:34:28.635310233Z" level=info msg="TearDown network for sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" successfully" Dec 13 14:34:28.635727 env[1834]: time="2024-12-13T14:34:28.635366377Z" level=info msg="StopPodSandbox for \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" returns successfully" Dec 13 14:34:28.636227 env[1834]: time="2024-12-13T14:34:28.636127872Z" level=info msg="RemovePodSandbox for \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\"" Dec 13 14:34:28.636982 env[1834]: time="2024-12-13T14:34:28.636232327Z" level=info msg="Forcibly stopping sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\"" Dec 13 14:34:28.636982 env[1834]: time="2024-12-13T14:34:28.636327479Z" level=info msg="TearDown network for sandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" successfully" Dec 13 14:34:28.643343 env[1834]: time="2024-12-13T14:34:28.641422182Z" level=info msg="RemovePodSandbox \"b31f354c9abd41f3599237a35dce490555f0555c6d9d49abe27b0bfcae4c7289\" returns successfully" Dec 13 14:34:28.978518 systemd[1]: run-containerd-runc-k8s.io-a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a-runc.T3RcgR.mount: Deactivated successfully. Dec 13 14:34:29.510547 kubelet[2290]: E1213 14:34:29.510476 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:30.511376 kubelet[2290]: E1213 14:34:30.511326 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:30.868732 kubelet[2290]: E1213 14:34:30.868514 2290 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": context deadline exceeded" Dec 13 14:34:31.511945 kubelet[2290]: E1213 14:34:31.511848 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:32.512686 kubelet[2290]: E1213 14:34:32.512638 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:33.513106 kubelet[2290]: E1213 14:34:33.513050 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:34.513924 kubelet[2290]: E1213 14:34:34.513836 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:35.514732 kubelet[2290]: E1213 14:34:35.514682 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:36.515887 kubelet[2290]: E1213 14:34:36.515834 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:37.517058 kubelet[2290]: E1213 14:34:37.517002 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:38.517320 kubelet[2290]: E1213 14:34:38.517274 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:39.518366 kubelet[2290]: E1213 14:34:39.518325 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:40.519932 kubelet[2290]: E1213 14:34:40.519674 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:40.871719 kubelet[2290]: E1213 14:34:40.871605 2290 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:34:41.520960 kubelet[2290]: E1213 14:34:41.520884 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:42.521333 kubelet[2290]: E1213 14:34:42.521285 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:43.522055 kubelet[2290]: E1213 14:34:43.522003 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:44.523131 kubelet[2290]: E1213 14:34:44.523076 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:45.524289 kubelet[2290]: E1213 14:34:45.524240 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:46.525326 kubelet[2290]: E1213 14:34:46.525272 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:47.370743 kubelet[2290]: E1213 14:34:47.370696 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:47.526044 kubelet[2290]: E1213 14:34:47.525993 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:48.526698 kubelet[2290]: E1213 14:34:48.526647 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:49.527450 kubelet[2290]: E1213 14:34:49.527396 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:50.528288 kubelet[2290]: E1213 14:34:50.528237 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:50.872658 kubelet[2290]: E1213 14:34:50.872521 2290 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:34:51.528666 kubelet[2290]: E1213 14:34:51.528606 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:52.535754 kubelet[2290]: E1213 14:34:52.535710 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:53.536931 kubelet[2290]: E1213 14:34:53.536878 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:54.537815 kubelet[2290]: E1213 14:34:54.537760 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:55.538821 kubelet[2290]: E1213 14:34:55.538769 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:56.538990 kubelet[2290]: E1213 14:34:56.538934 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:57.177813 kubelet[2290]: E1213 14:34:57.177756 2290 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": unexpected EOF" Dec 13 14:34:57.195096 kubelet[2290]: E1213 14:34:57.195024 2290 controller.go:195] "Failed to update lease" err="Put \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:34:57.210634 kubelet[2290]: I1213 14:34:57.210586 2290 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Dec 13 14:34:57.211295 kubelet[2290]: E1213 14:34:57.211269 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" interval="200ms" Dec 13 14:34:57.213057 kubelet[2290]: E1213 14:34:57.213022 2290 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.29.25:6443/api/v1/namespaces/calico-system/events\": unexpected EOF" event=< Dec 13 14:34:57.213057 kubelet[2290]: &Event{ObjectMeta:{calico-kube-controllers-74667b956-29hxb.1810c33061897428 calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-kube-controllers-74667b956-29hxb,UID:26e82c75-b746-42a7-8a44-3696990105e8,APIVersion:v1,ResourceVersion:1304,FieldPath:spec.containers{calico-kube-controllers},},Reason:Unhealthy,Message:Liveness probe failed: Error verifying datastore: Get "https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default": context deadline exceeded; Error reaching apiserver: Get "https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default": context deadline exceeded with http status code: 500 Dec 13 14:34:57.213057 kubelet[2290]: ,Source:EventSource{Component:kubelet,Host:172.31.21.211,},FirstTimestamp:2024-12-13 14:34:29.099885608 +0000 UTC m=+122.237069003,LastTimestamp:2024-12-13 14:34:29.099885608 +0000 UTC m=+122.237069003,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.211,} Dec 13 14:34:57.213057 kubelet[2290]: > Dec 13 14:34:57.266431 kubelet[2290]: E1213 14:34:57.266397 2290 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.29.25:6443/api/v1/namespaces/calico-system/events\": dial tcp 172.31.29.25:6443: connect: connection refused" event=< Dec 13 14:34:57.266431 kubelet[2290]: &Event{ObjectMeta:{calico-kube-controllers-74667b956-29hxb.1810c33061897428 calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-kube-controllers-74667b956-29hxb,UID:26e82c75-b746-42a7-8a44-3696990105e8,APIVersion:v1,ResourceVersion:1304,FieldPath:spec.containers{calico-kube-controllers},},Reason:Unhealthy,Message:Liveness probe failed: Error verifying datastore: Get "https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default": context deadline exceeded; Error reaching apiserver: Get "https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default": context deadline exceeded with http status code: 500 Dec 13 14:34:57.266431 kubelet[2290]: ,Source:EventSource{Component:kubelet,Host:172.31.21.211,},FirstTimestamp:2024-12-13 14:34:29.099885608 +0000 UTC m=+122.237069003,LastTimestamp:2024-12-13 14:34:29.099885608 +0000 UTC m=+122.237069003,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.21.211,} Dec 13 14:34:57.266431 kubelet[2290]: > Dec 13 14:34:57.412613 kubelet[2290]: E1213 14:34:57.412571 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" interval="400ms" Dec 13 14:34:57.540121 kubelet[2290]: E1213 14:34:57.539990 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:57.814335 kubelet[2290]: E1213 14:34:57.814229 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" interval="800ms" Dec 13 14:34:58.197844 kubelet[2290]: I1213 14:34:58.197804 2290 status_manager.go:853] "Failed to get status for pod" podUID="8c160ac6-4657-460a-83b3-a2e0904b7db1" pod="calico-system/calico-node-4n6ml" err="Get \"https://172.31.29.25:6443/api/v1/namespaces/calico-system/pods/calico-node-4n6ml\": dial tcp 172.31.29.25:6443: connect: connection refused - error from a previous attempt: unexpected EOF" Dec 13 14:34:58.202531 kubelet[2290]: I1213 14:34:58.202494 2290 status_manager.go:853] "Failed to get status for pod" podUID="8c160ac6-4657-460a-83b3-a2e0904b7db1" pod="calico-system/calico-node-4n6ml" err="Get \"https://172.31.29.25:6443/api/v1/namespaces/calico-system/pods/calico-node-4n6ml\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:34:58.541249 kubelet[2290]: E1213 14:34:58.541103 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:58.615915 kubelet[2290]: E1213 14:34:58.615875 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" interval="1.6s" Dec 13 14:34:58.991235 systemd[1]: run-containerd-runc-k8s.io-a055773729d182eac07366c56f9a4d47767d2fad447ba29c775b1c557fbfa95a-runc.CsD490.mount: Deactivated successfully. Dec 13 14:34:59.542457 kubelet[2290]: E1213 14:34:59.542263 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:34:59.783905 systemd[1]: run-containerd-runc-k8s.io-9d6f942d42b937f09436bd8de815038f2a777fcc11e84a42445176a6ed68e8b2-runc.4vsmVf.mount: Deactivated successfully. Dec 13 14:35:00.217059 kubelet[2290]: E1213 14:35:00.217023 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" interval="3.2s" Dec 13 14:35:00.543532 kubelet[2290]: E1213 14:35:00.543246 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:01.398602 kubelet[2290]: E1213 14:35:01.398562 2290 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.211\": Get \"https://172.31.29.25:6443/api/v1/nodes/172.31.21.211?resourceVersion=0&timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:35:01.399330 kubelet[2290]: E1213 14:35:01.399296 2290 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.211\": Get \"https://172.31.29.25:6443/api/v1/nodes/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:35:01.399890 kubelet[2290]: E1213 14:35:01.399739 2290 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.211\": Get \"https://172.31.29.25:6443/api/v1/nodes/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:35:01.400173 kubelet[2290]: E1213 14:35:01.400141 2290 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.211\": Get \"https://172.31.29.25:6443/api/v1/nodes/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:35:01.400539 kubelet[2290]: E1213 14:35:01.400515 2290 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.211\": Get \"https://172.31.29.25:6443/api/v1/nodes/172.31.21.211?timeout=10s\": dial tcp 172.31.29.25:6443: connect: connection refused" Dec 13 14:35:01.400539 kubelet[2290]: E1213 14:35:01.400538 2290 kubelet_node_status.go:531] "Unable to update node status" err="update node status exceeds retry count" Dec 13 14:35:01.545668 kubelet[2290]: E1213 14:35:01.545613 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:02.546501 kubelet[2290]: E1213 14:35:02.546444 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:03.547233 kubelet[2290]: E1213 14:35:03.547154 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:04.547738 kubelet[2290]: E1213 14:35:04.547685 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:05.549030 kubelet[2290]: E1213 14:35:05.548932 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:06.549879 kubelet[2290]: E1213 14:35:06.549830 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:07.370591 kubelet[2290]: E1213 14:35:07.370531 2290 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:07.550444 kubelet[2290]: E1213 14:35:07.550383 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:08.551046 kubelet[2290]: E1213 14:35:08.550925 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:09.551639 kubelet[2290]: E1213 14:35:09.551531 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:10.552143 kubelet[2290]: E1213 14:35:10.552087 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:11.552802 kubelet[2290]: E1213 14:35:11.552750 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:12.553884 kubelet[2290]: E1213 14:35:12.553829 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:13.418193 kubelet[2290]: E1213 14:35:13.418125 2290 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.21.211?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="6.4s" Dec 13 14:35:13.554870 kubelet[2290]: E1213 14:35:13.554825 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:14.555974 kubelet[2290]: E1213 14:35:14.555919 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:15.556630 kubelet[2290]: E1213 14:35:15.556579 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:16.557736 kubelet[2290]: E1213 14:35:16.557623 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:17.558518 kubelet[2290]: E1213 14:35:17.558461 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:18.559494 kubelet[2290]: E1213 14:35:18.558943 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:19.560058 kubelet[2290]: E1213 14:35:19.560004 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:20.560617 kubelet[2290]: E1213 14:35:20.560560 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:21.560996 kubelet[2290]: E1213 14:35:21.560945 2290 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:35:21.687191 kubelet[2290]: E1213 14:35:21.687125 2290 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.21.211\": Get \"https://172.31.29.25:6443/api/v1/nodes/172.31.21.211?resourceVersion=0&timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)"