Dec 13 14:49:34.292166 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:49:34.292205 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:49:34.292221 kernel: BIOS-provided physical RAM map: Dec 13 14:49:34.292234 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:49:34.292245 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:49:34.292257 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:49:34.292274 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 14:49:34.292287 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 14:49:34.292298 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 14:49:34.292310 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:49:34.292322 kernel: NX (Execute Disable) protection: active Dec 13 14:49:34.292334 kernel: SMBIOS 2.7 present. Dec 13 14:49:34.292346 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 14:49:34.292358 kernel: Hypervisor detected: KVM Dec 13 14:49:34.292375 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:49:34.292386 kernel: kvm-clock: cpu 0, msr 6d19a001, primary cpu clock Dec 13 14:49:34.292396 kernel: kvm-clock: using sched offset of 7757216325 cycles Dec 13 14:49:34.292408 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:49:34.292419 kernel: tsc: Detected 2499.996 MHz processor Dec 13 14:49:34.292430 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:49:34.292444 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:49:34.292455 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 14:49:34.292468 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:49:34.292481 kernel: Using GB pages for direct mapping Dec 13 14:49:34.292494 kernel: ACPI: Early table checksum verification disabled Dec 13 14:49:34.292506 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 14:49:34.292518 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 14:49:34.292529 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:49:34.292540 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 14:49:34.292554 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 14:49:34.292565 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:49:34.292577 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:49:34.292588 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 14:49:34.292600 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:49:34.292611 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 14:49:34.292623 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 14:49:34.292634 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:49:34.292648 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 14:49:34.292660 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 14:49:34.292672 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 14:49:34.292689 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 14:49:34.292701 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 14:49:34.292714 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 14:49:34.292727 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 14:49:34.292742 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 14:49:34.292755 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 14:49:34.292768 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 14:49:34.292780 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:49:34.292794 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:49:34.292807 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 14:49:34.292820 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 14:49:34.292832 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 14:49:34.292848 kernel: Zone ranges: Dec 13 14:49:34.292860 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:49:34.292886 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 14:49:34.292898 kernel: Normal empty Dec 13 14:49:34.292911 kernel: Movable zone start for each node Dec 13 14:49:34.292924 kernel: Early memory node ranges Dec 13 14:49:34.292936 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:49:34.292950 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 14:49:34.292963 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 14:49:34.292979 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:49:34.292992 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:49:34.293006 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 14:49:34.293019 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:49:34.293032 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:49:34.293045 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 14:49:34.293059 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:49:34.293072 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:49:34.293086 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:49:34.293102 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:49:34.293115 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:49:34.293129 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:49:34.293142 kernel: TSC deadline timer available Dec 13 14:49:34.293155 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:49:34.293168 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 14:49:34.293182 kernel: Booting paravirtualized kernel on KVM Dec 13 14:49:34.293195 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:49:34.293208 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:49:34.293224 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:49:34.293238 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:49:34.293251 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:49:34.293264 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 14:49:34.293278 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:49:34.293291 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:49:34.293305 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 14:49:34.293319 kernel: Policy zone: DMA32 Dec 13 14:49:34.293335 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:49:34.293352 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:49:34.293365 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:49:34.293379 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:49:34.293393 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:49:34.293407 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123080K reserved, 0K cma-reserved) Dec 13 14:49:34.293421 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:49:34.293434 kernel: Kernel/User page tables isolation: enabled Dec 13 14:49:34.293448 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:49:34.293464 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:49:34.293477 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:49:34.293492 kernel: rcu: RCU event tracing is enabled. Dec 13 14:49:34.293506 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:49:34.293520 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:49:34.293534 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:49:34.293548 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:49:34.293561 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:49:34.293575 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:49:34.293591 kernel: random: crng init done Dec 13 14:49:34.293605 kernel: Console: colour VGA+ 80x25 Dec 13 14:49:34.293619 kernel: printk: console [ttyS0] enabled Dec 13 14:49:34.293632 kernel: ACPI: Core revision 20210730 Dec 13 14:49:34.293646 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 14:49:34.293660 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:49:34.293674 kernel: x2apic enabled Dec 13 14:49:34.293688 kernel: Switched APIC routing to physical x2apic. Dec 13 14:49:34.293702 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 14:49:34.293719 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Dec 13 14:49:34.293732 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:49:34.293746 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:49:34.293759 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:49:34.293784 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:49:34.293801 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:49:34.293816 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:49:34.293831 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:49:34.293845 kernel: RETBleed: Vulnerable Dec 13 14:49:34.293858 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:49:34.293888 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:49:34.293903 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:49:34.293918 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:49:34.293934 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:49:34.293952 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:49:34.293967 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:49:34.293981 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 14:49:34.293994 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 14:49:34.294008 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:49:34.294024 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:49:34.294037 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:49:34.294050 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 14:49:34.294064 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:49:34.294077 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 14:49:34.294091 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 14:49:34.294104 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 14:49:34.294117 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 14:49:34.294131 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 14:49:34.294144 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 14:49:34.294158 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 14:49:34.294172 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:49:34.294188 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:49:34.294202 kernel: LSM: Security Framework initializing Dec 13 14:49:34.294215 kernel: SELinux: Initializing. Dec 13 14:49:34.294230 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:49:34.294244 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:49:34.294257 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:49:34.294271 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:49:34.294286 kernel: signal: max sigframe size: 3632 Dec 13 14:49:34.294301 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:49:34.294315 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:49:34.294332 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:49:34.294346 kernel: x86: Booting SMP configuration: Dec 13 14:49:34.294360 kernel: .... node #0, CPUs: #1 Dec 13 14:49:34.294375 kernel: kvm-clock: cpu 1, msr 6d19a041, secondary cpu clock Dec 13 14:49:34.294389 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 14:49:34.294404 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:49:34.294420 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:49:34.294434 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:49:34.294448 kernel: smpboot: Max logical packages: 1 Dec 13 14:49:34.294465 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Dec 13 14:49:34.294479 kernel: devtmpfs: initialized Dec 13 14:49:34.294493 kernel: x86/mm: Memory block size: 128MB Dec 13 14:49:34.294507 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:49:34.294522 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:49:34.294537 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:49:34.294551 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:49:34.294565 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:49:34.294579 kernel: audit: type=2000 audit(1734101372.520:1): state=initialized audit_enabled=0 res=1 Dec 13 14:49:34.294596 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:49:34.294610 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:49:34.294624 kernel: cpuidle: using governor menu Dec 13 14:49:34.294639 kernel: ACPI: bus type PCI registered Dec 13 14:49:34.294653 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:49:34.294668 kernel: dca service started, version 1.12.1 Dec 13 14:49:34.294683 kernel: PCI: Using configuration type 1 for base access Dec 13 14:49:34.294697 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:49:34.294711 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:49:34.294727 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:49:34.294740 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:49:34.294754 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:49:34.294769 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:49:34.294781 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:49:34.294794 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:49:34.294807 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:49:34.294819 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:49:34.294831 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:49:34.294849 kernel: ACPI: Interpreter enabled Dec 13 14:49:34.294885 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:49:34.294899 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:49:34.295001 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:49:34.295015 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:49:34.295030 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:49:34.295249 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:49:34.295381 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:49:34.295405 kernel: acpiphp: Slot [3] registered Dec 13 14:49:34.295420 kernel: acpiphp: Slot [4] registered Dec 13 14:49:34.295435 kernel: acpiphp: Slot [5] registered Dec 13 14:49:34.295450 kernel: acpiphp: Slot [6] registered Dec 13 14:49:34.295465 kernel: acpiphp: Slot [7] registered Dec 13 14:49:34.295478 kernel: acpiphp: Slot [8] registered Dec 13 14:49:34.295490 kernel: acpiphp: Slot [9] registered Dec 13 14:49:34.295502 kernel: acpiphp: Slot [10] registered Dec 13 14:49:34.295515 kernel: acpiphp: Slot [11] registered Dec 13 14:49:34.295530 kernel: acpiphp: Slot [12] registered Dec 13 14:49:34.295542 kernel: acpiphp: Slot [13] registered Dec 13 14:49:34.295555 kernel: acpiphp: Slot [14] registered Dec 13 14:49:34.295569 kernel: acpiphp: Slot [15] registered Dec 13 14:49:34.295584 kernel: acpiphp: Slot [16] registered Dec 13 14:49:34.295599 kernel: acpiphp: Slot [17] registered Dec 13 14:49:34.295614 kernel: acpiphp: Slot [18] registered Dec 13 14:49:34.295628 kernel: acpiphp: Slot [19] registered Dec 13 14:49:34.295711 kernel: acpiphp: Slot [20] registered Dec 13 14:49:34.295728 kernel: acpiphp: Slot [21] registered Dec 13 14:49:34.295741 kernel: acpiphp: Slot [22] registered Dec 13 14:49:34.295754 kernel: acpiphp: Slot [23] registered Dec 13 14:49:34.295767 kernel: acpiphp: Slot [24] registered Dec 13 14:49:34.295780 kernel: acpiphp: Slot [25] registered Dec 13 14:49:34.295793 kernel: acpiphp: Slot [26] registered Dec 13 14:49:34.295805 kernel: acpiphp: Slot [27] registered Dec 13 14:49:34.295816 kernel: acpiphp: Slot [28] registered Dec 13 14:49:34.295827 kernel: acpiphp: Slot [29] registered Dec 13 14:49:34.295839 kernel: acpiphp: Slot [30] registered Dec 13 14:49:34.295853 kernel: acpiphp: Slot [31] registered Dec 13 14:49:34.295897 kernel: PCI host bridge to bus 0000:00 Dec 13 14:49:34.296044 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:49:34.296148 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:49:34.296249 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:49:34.296347 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:49:34.296448 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:49:34.296579 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:49:34.296700 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:49:34.296829 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 14:49:34.296953 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:49:34.297063 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 14:49:34.297173 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 14:49:34.297285 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 14:49:34.297398 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 14:49:34.297507 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 14:49:34.297719 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 14:49:34.297836 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 14:49:34.297966 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 14:49:34.298075 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 14:49:34.298185 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 14:49:34.298300 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:49:34.298469 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:49:34.298581 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 14:49:34.298700 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:49:34.298813 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 14:49:34.298830 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:49:34.298846 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:49:34.298860 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:49:34.298892 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:49:34.298904 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:49:34.298916 kernel: iommu: Default domain type: Translated Dec 13 14:49:34.298929 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:49:34.299047 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 14:49:34.299180 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:49:34.299304 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 14:49:34.299328 kernel: vgaarb: loaded Dec 13 14:49:34.299344 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:49:34.299359 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:49:34.299374 kernel: PTP clock support registered Dec 13 14:49:34.299389 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:49:34.299404 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:49:34.299419 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:49:34.299434 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 14:49:34.299451 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 14:49:34.299466 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 14:49:34.299481 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:49:34.299496 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:49:34.299511 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:49:34.299526 kernel: pnp: PnP ACPI init Dec 13 14:49:34.299541 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:49:34.299556 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:49:34.299572 kernel: NET: Registered PF_INET protocol family Dec 13 14:49:34.299590 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:49:34.299605 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:49:34.299620 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:49:34.299692 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:49:34.299710 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:49:34.299726 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:49:34.299741 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:49:34.299756 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:49:34.299772 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:49:34.299790 kernel: NET: Registered PF_XDP protocol family Dec 13 14:49:34.300093 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:49:34.300221 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:49:34.300335 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:49:34.300449 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:49:34.300584 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:49:34.300999 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:49:34.301027 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:49:34.301042 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:49:34.301056 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 14:49:34.301069 kernel: clocksource: Switched to clocksource tsc Dec 13 14:49:34.301082 kernel: Initialise system trusted keyrings Dec 13 14:49:34.301095 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:49:34.301110 kernel: Key type asymmetric registered Dec 13 14:49:34.301122 kernel: Asymmetric key parser 'x509' registered Dec 13 14:49:34.301136 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:49:34.301154 kernel: io scheduler mq-deadline registered Dec 13 14:49:34.301170 kernel: io scheduler kyber registered Dec 13 14:49:34.301186 kernel: io scheduler bfq registered Dec 13 14:49:34.301201 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:49:34.301217 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:49:34.301232 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:49:34.301244 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:49:34.301258 kernel: i8042: Warning: Keylock active Dec 13 14:49:34.301270 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:49:34.301287 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:49:34.301544 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:49:34.302043 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:49:34.302197 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:49:33 UTC (1734101373) Dec 13 14:49:34.302322 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:49:34.302343 kernel: intel_pstate: CPU model not supported Dec 13 14:49:34.302359 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:49:34.302374 kernel: Segment Routing with IPv6 Dec 13 14:49:34.302394 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:49:34.302409 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:49:34.302425 kernel: Key type dns_resolver registered Dec 13 14:49:34.302440 kernel: IPI shorthand broadcast: enabled Dec 13 14:49:34.302456 kernel: sched_clock: Marking stable (503683367, 301027836)->(945588931, -140877728) Dec 13 14:49:34.302471 kernel: registered taskstats version 1 Dec 13 14:49:34.302487 kernel: Loading compiled-in X.509 certificates Dec 13 14:49:34.302502 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:49:34.302517 kernel: Key type .fscrypt registered Dec 13 14:49:34.302535 kernel: Key type fscrypt-provisioning registered Dec 13 14:49:34.302551 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:49:34.302566 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:49:34.302581 kernel: ima: No architecture policies found Dec 13 14:49:34.302596 kernel: clk: Disabling unused clocks Dec 13 14:49:34.302612 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:49:34.302626 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:49:34.302642 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:49:34.302657 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:49:34.302675 kernel: Run /init as init process Dec 13 14:49:34.302690 kernel: with arguments: Dec 13 14:49:34.302704 kernel: /init Dec 13 14:49:34.302720 kernel: with environment: Dec 13 14:49:34.302735 kernel: HOME=/ Dec 13 14:49:34.302751 kernel: TERM=linux Dec 13 14:49:34.302765 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:49:34.302784 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:49:34.302806 systemd[1]: Detected virtualization amazon. Dec 13 14:49:34.302822 systemd[1]: Detected architecture x86-64. Dec 13 14:49:34.302837 systemd[1]: Running in initrd. Dec 13 14:49:34.302853 systemd[1]: No hostname configured, using default hostname. Dec 13 14:49:34.302900 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:49:34.302921 systemd[1]: Hostname set to . Dec 13 14:49:34.302940 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:49:34.302957 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:49:34.302972 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:49:34.302988 systemd[1]: Reached target cryptsetup.target. Dec 13 14:49:34.303005 systemd[1]: Reached target paths.target. Dec 13 14:49:34.303021 systemd[1]: Reached target slices.target. Dec 13 14:49:34.303037 systemd[1]: Reached target swap.target. Dec 13 14:49:34.303053 systemd[1]: Reached target timers.target. Dec 13 14:49:34.303074 systemd[1]: Listening on iscsid.socket. Dec 13 14:49:34.303091 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:49:34.303111 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:49:34.303127 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:49:34.303143 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:49:34.303168 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:49:34.303185 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:49:34.303202 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:49:34.303222 systemd[1]: Reached target sockets.target. Dec 13 14:49:34.303239 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:49:34.303255 systemd[1]: Finished network-cleanup.service. Dec 13 14:49:34.303272 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:49:34.303287 systemd[1]: Starting systemd-journald.service... Dec 13 14:49:34.303304 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:49:34.303320 systemd[1]: Starting systemd-resolved.service... Dec 13 14:49:34.303335 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:49:34.303356 systemd-journald[185]: Journal started Dec 13 14:49:34.303434 systemd-journald[185]: Runtime Journal (/run/log/journal/ec22debc720bbd29ba7ac667ae4c493e) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:49:34.304902 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:49:34.322635 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:49:34.553184 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:49:34.553224 kernel: Bridge firewalling registered Dec 13 14:49:34.553242 kernel: SCSI subsystem initialized Dec 13 14:49:34.553258 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:49:34.553279 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:49:34.553298 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:49:34.553315 systemd[1]: Started systemd-journald.service. Dec 13 14:49:34.553337 kernel: audit: type=1130 audit(1734101374.546:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.388643 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:49:34.388655 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:49:34.562229 kernel: audit: type=1130 audit(1734101374.554:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.388709 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:49:34.392164 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:49:34.403303 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:49:34.482983 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:49:34.576203 kernel: audit: type=1130 audit(1734101374.571:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.569252 systemd[1]: Started systemd-resolved.service. Dec 13 14:49:34.572407 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:49:34.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.579485 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:49:34.583885 kernel: audit: type=1130 audit(1734101374.577:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.585267 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:49:34.589894 kernel: audit: type=1130 audit(1734101374.583:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.591010 systemd[1]: Reached target nss-lookup.target. Dec 13 14:49:34.596979 kernel: audit: type=1130 audit(1734101374.588:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.598039 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:49:34.600613 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:49:34.602431 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:49:34.622860 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:49:34.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.630895 kernel: audit: type=1130 audit(1734101374.621:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.634609 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:49:34.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.643991 kernel: audit: type=1130 audit(1734101374.633:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.649258 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:49:34.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.652940 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:49:34.661662 kernel: audit: type=1130 audit(1734101374.650:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.674249 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:49:34.678439 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:49:34.793422 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:49:34.858899 kernel: iscsi: registered transport (tcp) Dec 13 14:49:34.909051 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:49:34.909135 kernel: QLogic iSCSI HBA Driver Dec 13 14:49:34.963982 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:49:34.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:34.970385 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:49:35.034930 kernel: raid6: avx512x4 gen() 15065 MB/s Dec 13 14:49:35.051923 kernel: raid6: avx512x4 xor() 7272 MB/s Dec 13 14:49:35.068928 kernel: raid6: avx512x2 gen() 15402 MB/s Dec 13 14:49:35.085944 kernel: raid6: avx512x2 xor() 20890 MB/s Dec 13 14:49:35.103918 kernel: raid6: avx512x1 gen() 11663 MB/s Dec 13 14:49:35.128939 kernel: raid6: avx512x1 xor() 3405 MB/s Dec 13 14:49:35.145921 kernel: raid6: avx2x4 gen() 6145 MB/s Dec 13 14:49:35.162971 kernel: raid6: avx2x4 xor() 5379 MB/s Dec 13 14:49:35.179926 kernel: raid6: avx2x2 gen() 15405 MB/s Dec 13 14:49:35.197915 kernel: raid6: avx2x2 xor() 15198 MB/s Dec 13 14:49:35.214923 kernel: raid6: avx2x1 gen() 11251 MB/s Dec 13 14:49:35.231909 kernel: raid6: avx2x1 xor() 13762 MB/s Dec 13 14:49:35.248920 kernel: raid6: sse2x4 gen() 8320 MB/s Dec 13 14:49:35.268916 kernel: raid6: sse2x4 xor() 4259 MB/s Dec 13 14:49:35.285921 kernel: raid6: sse2x2 gen() 8408 MB/s Dec 13 14:49:35.302908 kernel: raid6: sse2x2 xor() 5498 MB/s Dec 13 14:49:35.319919 kernel: raid6: sse2x1 gen() 5550 MB/s Dec 13 14:49:35.338285 kernel: raid6: sse2x1 xor() 3342 MB/s Dec 13 14:49:35.338361 kernel: raid6: using algorithm avx2x2 gen() 15405 MB/s Dec 13 14:49:35.338378 kernel: raid6: .... xor() 15198 MB/s, rmw enabled Dec 13 14:49:35.339299 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:49:35.354896 kernel: xor: automatically using best checksumming function avx Dec 13 14:49:35.493897 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:49:35.504368 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:49:35.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:35.504000 audit: BPF prog-id=7 op=LOAD Dec 13 14:49:35.504000 audit: BPF prog-id=8 op=LOAD Dec 13 14:49:35.506380 systemd[1]: Starting systemd-udevd.service... Dec 13 14:49:35.523598 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 14:49:35.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:35.530462 systemd[1]: Started systemd-udevd.service. Dec 13 14:49:35.533305 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:49:35.564808 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation Dec 13 14:49:35.611399 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:49:35.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:35.614653 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:49:35.681822 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:49:35.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:35.765545 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:49:35.811705 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:49:35.811882 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:49:35.811902 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 14:49:35.812027 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:49:35.812044 kernel: AES CTR mode by8 optimization enabled Dec 13 14:49:35.812069 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:f1:cc:5a:90:f9 Dec 13 14:49:35.814220 (udev-worker)[435]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:49:35.999148 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:49:35.999421 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:49:35.999448 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:49:35.999766 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:49:35.999789 kernel: GPT:9289727 != 16777215 Dec 13 14:49:35.999807 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:49:35.999827 kernel: GPT:9289727 != 16777215 Dec 13 14:49:35.999848 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:49:35.999881 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:49:36.020900 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (441) Dec 13 14:49:36.037109 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:49:36.079716 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:49:36.082757 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:49:36.095804 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:49:36.099574 systemd[1]: Starting disk-uuid.service... Dec 13 14:49:36.111956 disk-uuid[572]: Primary Header is updated. Dec 13 14:49:36.111956 disk-uuid[572]: Secondary Entries is updated. Dec 13 14:49:36.111956 disk-uuid[572]: Secondary Header is updated. Dec 13 14:49:36.155340 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:49:37.133567 disk-uuid[576]: The operation has completed successfully. Dec 13 14:49:37.135949 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:49:37.298658 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:49:37.298775 systemd[1]: Finished disk-uuid.service. Dec 13 14:49:37.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.310838 systemd[1]: Starting verity-setup.service... Dec 13 14:49:37.330891 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:49:37.426158 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:49:37.429136 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:49:37.435275 systemd[1]: Finished verity-setup.service. Dec 13 14:49:37.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.541401 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:49:37.541861 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:49:37.542950 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:49:37.543917 systemd[1]: Starting ignition-setup.service... Dec 13 14:49:37.548255 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:49:37.579111 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:49:37.579188 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:49:37.579203 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:49:37.596896 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:49:37.617651 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:49:37.630106 systemd[1]: Finished ignition-setup.service. Dec 13 14:49:37.632928 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:49:37.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.659594 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:49:37.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.659000 audit: BPF prog-id=9 op=LOAD Dec 13 14:49:37.662726 systemd[1]: Starting systemd-networkd.service... Dec 13 14:49:37.697303 systemd-networkd[1023]: lo: Link UP Dec 13 14:49:37.697315 systemd-networkd[1023]: lo: Gained carrier Dec 13 14:49:37.706330 systemd-networkd[1023]: Enumeration completed Dec 13 14:49:37.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.706475 systemd[1]: Started systemd-networkd.service. Dec 13 14:49:37.708531 systemd[1]: Reached target network.target. Dec 13 14:49:37.708652 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:49:37.723923 systemd[1]: Starting iscsiuio.service... Dec 13 14:49:37.736209 systemd-networkd[1023]: eth0: Link UP Dec 13 14:49:37.737688 systemd-networkd[1023]: eth0: Gained carrier Dec 13 14:49:37.738847 systemd[1]: Started iscsiuio.service. Dec 13 14:49:37.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.741253 systemd[1]: Starting iscsid.service... Dec 13 14:49:37.746448 iscsid[1028]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:49:37.746448 iscsid[1028]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:49:37.746448 iscsid[1028]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:49:37.746448 iscsid[1028]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:49:37.746448 iscsid[1028]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:49:37.746448 iscsid[1028]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:49:37.755538 systemd[1]: Started iscsid.service. Dec 13 14:49:37.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.764039 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:49:37.770517 systemd-networkd[1023]: eth0: DHCPv4 address 172.31.26.144/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:49:37.782907 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:49:37.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:37.784940 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:49:37.786728 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:49:37.788824 systemd[1]: Reached target remote-fs.target. Dec 13 14:49:37.791837 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:49:37.810182 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:49:37.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.472297 ignition[1001]: Ignition 2.14.0 Dec 13 14:49:38.472313 ignition[1001]: Stage: fetch-offline Dec 13 14:49:38.472466 ignition[1001]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:38.472520 ignition[1001]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:38.507412 ignition[1001]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:38.509216 ignition[1001]: Ignition finished successfully Dec 13 14:49:38.511856 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:49:38.519547 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:49:38.519622 kernel: audit: type=1130 audit(1734101378.511:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.514839 systemd[1]: Starting ignition-fetch.service... Dec 13 14:49:38.528492 ignition[1047]: Ignition 2.14.0 Dec 13 14:49:38.528505 ignition[1047]: Stage: fetch Dec 13 14:49:38.528711 ignition[1047]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:38.528743 ignition[1047]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:38.538345 ignition[1047]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:38.539881 ignition[1047]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:38.571899 ignition[1047]: INFO : PUT result: OK Dec 13 14:49:38.575640 ignition[1047]: DEBUG : parsed url from cmdline: "" Dec 13 14:49:38.575640 ignition[1047]: INFO : no config URL provided Dec 13 14:49:38.575640 ignition[1047]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:49:38.575640 ignition[1047]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:49:38.581127 ignition[1047]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:38.582711 ignition[1047]: INFO : PUT result: OK Dec 13 14:49:38.583592 ignition[1047]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:49:38.584995 ignition[1047]: INFO : GET result: OK Dec 13 14:49:38.584995 ignition[1047]: DEBUG : parsing config with SHA512: 0affa10ab26ecaa6fe78667e1b13f2dccc139f3ec2a9840f5825f559268e70fd407915d6d2faf456a25c3800700175bd7e6a6b130f74afe7948060dd2fece44f Dec 13 14:49:38.590944 unknown[1047]: fetched base config from "system" Dec 13 14:49:38.590970 unknown[1047]: fetched base config from "system" Dec 13 14:49:38.590985 unknown[1047]: fetched user config from "aws" Dec 13 14:49:38.592991 ignition[1047]: fetch: fetch complete Dec 13 14:49:38.593005 ignition[1047]: fetch: fetch passed Dec 13 14:49:38.593075 ignition[1047]: Ignition finished successfully Dec 13 14:49:38.597746 systemd[1]: Finished ignition-fetch.service. Dec 13 14:49:38.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.601103 systemd[1]: Starting ignition-kargs.service... Dec 13 14:49:38.609199 kernel: audit: type=1130 audit(1734101378.598:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.619756 ignition[1053]: Ignition 2.14.0 Dec 13 14:49:38.619769 ignition[1053]: Stage: kargs Dec 13 14:49:38.620098 ignition[1053]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:38.620194 ignition[1053]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:38.630706 ignition[1053]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:38.631924 ignition[1053]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:38.633736 ignition[1053]: INFO : PUT result: OK Dec 13 14:49:38.637438 ignition[1053]: kargs: kargs passed Dec 13 14:49:38.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.638633 systemd[1]: Finished ignition-kargs.service. Dec 13 14:49:38.648834 kernel: audit: type=1130 audit(1734101378.638:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.637495 ignition[1053]: Ignition finished successfully Dec 13 14:49:38.647394 systemd[1]: Starting ignition-disks.service... Dec 13 14:49:38.660705 ignition[1059]: Ignition 2.14.0 Dec 13 14:49:38.660718 ignition[1059]: Stage: disks Dec 13 14:49:38.661017 ignition[1059]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:38.661048 ignition[1059]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:38.670271 ignition[1059]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:38.672412 ignition[1059]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:38.674277 ignition[1059]: INFO : PUT result: OK Dec 13 14:49:38.681856 ignition[1059]: disks: disks passed Dec 13 14:49:38.681973 ignition[1059]: Ignition finished successfully Dec 13 14:49:38.686166 systemd[1]: Finished ignition-disks.service. Dec 13 14:49:38.701577 kernel: audit: type=1130 audit(1734101378.686:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.687812 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:49:38.701598 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:49:38.702763 systemd[1]: Reached target local-fs.target. Dec 13 14:49:38.705198 systemd[1]: Reached target sysinit.target. Dec 13 14:49:38.705698 systemd[1]: Reached target basic.target. Dec 13 14:49:38.709300 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:49:38.777071 systemd-fsck[1067]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:49:38.780812 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:49:38.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.788887 kernel: audit: type=1130 audit(1734101378.781:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:38.789928 systemd[1]: Mounting sysroot.mount... Dec 13 14:49:38.819896 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:49:38.820721 systemd[1]: Mounted sysroot.mount. Dec 13 14:49:38.823625 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:49:38.832963 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:49:38.839419 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:49:38.840384 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:49:38.840447 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:49:38.851924 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:49:38.888241 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:49:38.893947 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:49:38.921153 initrd-setup-root[1089]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:49:38.934892 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1084) Dec 13 14:49:38.944541 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:49:38.944613 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:49:38.944631 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:49:38.946096 initrd-setup-root[1097]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:49:38.951083 initrd-setup-root[1121]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:49:38.956313 initrd-setup-root[1129]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:49:38.959888 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:49:38.988745 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:49:39.194045 systemd-networkd[1023]: eth0: Gained IPv6LL Dec 13 14:49:39.241762 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:49:39.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.244713 systemd[1]: Starting ignition-mount.service... Dec 13 14:49:39.252184 kernel: audit: type=1130 audit(1734101379.242:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.253166 systemd[1]: Starting sysroot-boot.service... Dec 13 14:49:39.258909 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:49:39.259038 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:49:39.275213 ignition[1149]: INFO : Ignition 2.14.0 Dec 13 14:49:39.275213 ignition[1149]: INFO : Stage: mount Dec 13 14:49:39.278178 ignition[1149]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:39.278178 ignition[1149]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:39.293587 ignition[1149]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:39.295094 ignition[1149]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:39.297939 ignition[1149]: INFO : PUT result: OK Dec 13 14:49:39.307765 ignition[1149]: INFO : mount: mount passed Dec 13 14:49:39.307765 ignition[1149]: INFO : Ignition finished successfully Dec 13 14:49:39.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.311887 systemd[1]: Finished sysroot-boot.service. Dec 13 14:49:39.317959 kernel: audit: type=1130 audit(1734101379.310:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.314060 systemd[1]: Finished ignition-mount.service. Dec 13 14:49:39.318965 systemd[1]: Starting ignition-files.service... Dec 13 14:49:39.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.326897 kernel: audit: type=1130 audit(1734101379.316:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:39.330119 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:49:39.349893 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1159) Dec 13 14:49:39.354095 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:49:39.354164 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:49:39.354182 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:49:39.386898 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:49:39.391638 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:49:39.406646 ignition[1178]: INFO : Ignition 2.14.0 Dec 13 14:49:39.406646 ignition[1178]: INFO : Stage: files Dec 13 14:49:39.408629 ignition[1178]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:39.408629 ignition[1178]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:39.419957 ignition[1178]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:39.421525 ignition[1178]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:39.423418 ignition[1178]: INFO : PUT result: OK Dec 13 14:49:39.429983 ignition[1178]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:49:39.436688 ignition[1178]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:49:39.436688 ignition[1178]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:49:39.459889 ignition[1178]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:49:39.461747 ignition[1178]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:49:39.461747 ignition[1178]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:49:39.461356 unknown[1178]: wrote ssh authorized keys file for user: core Dec 13 14:49:39.470260 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:49:39.481966 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:49:39.490022 ignition[1178]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3004240571" Dec 13 14:49:39.493656 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1181) Dec 13 14:49:39.493694 ignition[1178]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3004240571": device or resource busy Dec 13 14:49:39.493694 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3004240571", trying btrfs: device or resource busy Dec 13 14:49:39.493694 ignition[1178]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3004240571" Dec 13 14:49:39.500340 ignition[1178]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3004240571" Dec 13 14:49:39.503416 ignition[1178]: INFO : op(3): [started] unmounting "/mnt/oem3004240571" Dec 13 14:49:39.504794 ignition[1178]: INFO : op(3): [finished] unmounting "/mnt/oem3004240571" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:49:39.504794 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:49:39.504794 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:49:39.536977 ignition[1178]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3558359684" Dec 13 14:49:39.536977 ignition[1178]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3558359684": device or resource busy Dec 13 14:49:39.536977 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3558359684", trying btrfs: device or resource busy Dec 13 14:49:39.536977 ignition[1178]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3558359684" Dec 13 14:49:39.536977 ignition[1178]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3558359684" Dec 13 14:49:39.536977 ignition[1178]: INFO : op(6): [started] unmounting "/mnt/oem3558359684" Dec 13 14:49:39.536977 ignition[1178]: INFO : op(6): [finished] unmounting "/mnt/oem3558359684" Dec 13 14:49:39.536977 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:49:39.536977 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:49:39.536977 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:49:39.536977 ignition[1178]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem745400488" Dec 13 14:49:39.536977 ignition[1178]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem745400488": device or resource busy Dec 13 14:49:39.536977 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem745400488", trying btrfs: device or resource busy Dec 13 14:49:39.536977 ignition[1178]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem745400488" Dec 13 14:49:39.536977 ignition[1178]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem745400488" Dec 13 14:49:39.570460 ignition[1178]: INFO : op(9): [started] unmounting "/mnt/oem745400488" Dec 13 14:49:39.570460 ignition[1178]: INFO : op(9): [finished] unmounting "/mnt/oem745400488" Dec 13 14:49:39.570460 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:49:39.570460 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:49:39.570460 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:49:39.570460 ignition[1178]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem340919874" Dec 13 14:49:39.570460 ignition[1178]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem340919874": device or resource busy Dec 13 14:49:39.570460 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem340919874", trying btrfs: device or resource busy Dec 13 14:49:39.570460 ignition[1178]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem340919874" Dec 13 14:49:39.570460 ignition[1178]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem340919874" Dec 13 14:49:39.570460 ignition[1178]: INFO : op(c): [started] unmounting "/mnt/oem340919874" Dec 13 14:49:39.570460 ignition[1178]: INFO : op(c): [finished] unmounting "/mnt/oem340919874" Dec 13 14:49:39.570460 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:49:39.570460 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:49:39.570460 ignition[1178]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:49:40.057270 ignition[1178]: INFO : GET result: OK Dec 13 14:49:40.693254 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:49:40.693254 ignition[1178]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:49:40.693254 ignition[1178]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(e): [started] processing unit "nvidia.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(e): [finished] processing unit "nvidia.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Dec 13 14:49:40.713031 ignition[1178]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:49:40.748568 ignition[1178]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:49:40.752031 ignition[1178]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:49:40.752031 ignition[1178]: INFO : files: files passed Dec 13 14:49:40.752031 ignition[1178]: INFO : Ignition finished successfully Dec 13 14:49:40.755623 systemd[1]: Finished ignition-files.service. Dec 13 14:49:40.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.786047 kernel: audit: type=1130 audit(1734101380.765:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.789759 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:49:40.796419 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:49:40.798680 systemd[1]: Starting ignition-quench.service... Dec 13 14:49:40.807438 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:49:40.807588 systemd[1]: Finished ignition-quench.service. Dec 13 14:49:40.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.825887 kernel: audit: type=1130 audit(1734101380.810:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.846565 initrd-setup-root-after-ignition[1203]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:49:40.849195 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:49:40.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.850455 systemd[1]: Reached target ignition-complete.target. Dec 13 14:49:40.853655 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:49:40.873006 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:49:40.873117 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:49:40.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.875646 systemd[1]: Reached target initrd-fs.target. Dec 13 14:49:40.877197 systemd[1]: Reached target initrd.target. Dec 13 14:49:40.879387 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:49:40.880298 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:49:40.902187 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:49:40.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.905628 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:49:40.920125 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:49:40.922293 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:49:40.928571 systemd[1]: Stopped target timers.target. Dec 13 14:49:40.934163 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:49:40.937954 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:49:40.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:40.938656 systemd[1]: Stopped target initrd.target. Dec 13 14:49:40.939179 systemd[1]: Stopped target basic.target. Dec 13 14:49:40.939343 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:49:40.939499 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:49:40.939656 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:49:40.939822 systemd[1]: Stopped target remote-fs.target. Dec 13 14:49:40.940135 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:49:40.940314 systemd[1]: Stopped target sysinit.target. Dec 13 14:49:40.940459 systemd[1]: Stopped target local-fs.target. Dec 13 14:49:40.940619 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:49:40.940778 systemd[1]: Stopped target swap.target. Dec 13 14:49:40.940935 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:49:40.941081 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:49:40.941360 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:49:40.941559 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:49:40.941676 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:49:40.942023 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:49:40.942147 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:49:40.942777 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:49:40.942922 systemd[1]: Stopped ignition-files.service. Dec 13 14:49:40.946931 systemd[1]: Stopping ignition-mount.service... Dec 13 14:49:40.974303 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:49:41.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.052048 ignition[1216]: INFO : Ignition 2.14.0 Dec 13 14:49:41.052048 ignition[1216]: INFO : Stage: umount Dec 13 14:49:41.052048 ignition[1216]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:49:41.052048 ignition[1216]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:49:41.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.029881 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:49:41.030230 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:49:41.044386 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:49:41.044672 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:49:41.052320 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:49:41.053255 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:49:41.073752 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:49:41.076244 ignition[1216]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:49:41.077740 ignition[1216]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:49:41.080309 ignition[1216]: INFO : PUT result: OK Dec 13 14:49:41.085692 ignition[1216]: INFO : umount: umount passed Dec 13 14:49:41.085692 ignition[1216]: INFO : Ignition finished successfully Dec 13 14:49:41.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.089331 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:49:41.089929 systemd[1]: Stopped ignition-mount.service. Dec 13 14:49:41.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.091679 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:49:41.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.091803 systemd[1]: Stopped ignition-disks.service. Dec 13 14:49:41.095290 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:49:41.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.108276 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:49:41.110934 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:49:41.112119 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:49:41.121078 systemd[1]: Stopped target network.target. Dec 13 14:49:41.122499 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:49:41.122587 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:49:41.125697 systemd[1]: Stopped target paths.target. Dec 13 14:49:41.128307 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:49:41.132243 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:49:41.134054 systemd[1]: Stopped target slices.target. Dec 13 14:49:41.136851 systemd[1]: Stopped target sockets.target. Dec 13 14:49:41.145292 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:49:41.145371 systemd[1]: Closed iscsid.socket. Dec 13 14:49:41.153234 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:49:41.153510 systemd[1]: Closed iscsiuio.socket. Dec 13 14:49:41.155675 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:49:41.155755 systemd[1]: Stopped ignition-setup.service. Dec 13 14:49:41.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.158271 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:49:41.159873 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:49:41.163934 systemd-networkd[1023]: eth0: DHCPv6 lease lost Dec 13 14:49:41.165263 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:49:41.165375 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:49:41.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.169551 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:49:41.170717 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:49:41.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.171000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:49:41.172849 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:49:41.172000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:49:41.172908 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:49:41.175716 systemd[1]: Stopping network-cleanup.service... Dec 13 14:49:41.178420 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:49:41.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.178484 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:49:41.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.179498 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:49:41.179547 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:49:41.181711 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:49:41.181752 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:49:41.190248 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:49:41.194682 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:49:41.198005 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:49:41.198154 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:49:41.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.204556 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:49:41.204626 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:49:41.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.205837 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:49:41.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.205900 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:49:41.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.208901 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:49:41.209031 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:49:41.211110 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:49:41.211185 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:49:41.214368 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:49:41.214480 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:49:41.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.219120 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:49:41.227953 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:49:41.228052 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:49:41.230284 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:49:41.230353 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:49:41.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.235733 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:49:41.235831 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:49:41.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.241511 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:49:41.243017 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:49:41.244317 systemd[1]: Stopped network-cleanup.service. Dec 13 14:49:41.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.246918 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:49:41.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.247042 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:49:41.256789 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:49:41.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.257003 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:49:41.258759 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:49:41.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:41.260401 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:49:41.260479 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:49:41.263201 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:49:41.279592 systemd[1]: Switching root. Dec 13 14:49:41.306445 iscsid[1028]: iscsid shutting down. Dec 13 14:49:41.307574 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Dec 13 14:49:41.307660 systemd-journald[185]: Journal stopped Dec 13 14:49:56.011354 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:49:56.011522 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:49:56.011545 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:49:56.011564 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:49:56.011589 kernel: SELinux: policy capability open_perms=1 Dec 13 14:49:56.011606 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:49:56.011624 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:49:56.013167 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:49:56.013216 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:49:56.013277 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:49:56.013301 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:49:56.013362 systemd[1]: Successfully loaded SELinux policy in 163.826ms. Dec 13 14:49:56.013432 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.135ms. Dec 13 14:49:56.013460 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:49:56.013517 systemd[1]: Detected virtualization amazon. Dec 13 14:49:56.013538 systemd[1]: Detected architecture x86-64. Dec 13 14:49:56.013557 systemd[1]: Detected first boot. Dec 13 14:49:56.013809 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:49:56.013831 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:49:56.013850 kernel: kauditd_printk_skb: 46 callbacks suppressed Dec 13 14:49:56.013880 kernel: audit: type=1400 audit(1734101384.002:85): avc: denied { associate } for pid=1249 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:49:56.013907 kernel: audit: type=1300 audit(1734101384.002:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1232 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:56.013925 kernel: audit: type=1327 audit(1734101384.002:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:49:56.013943 kernel: audit: type=1400 audit(1734101384.010:86): avc: denied { associate } for pid=1249 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:49:56.013961 kernel: audit: type=1300 audit(1734101384.010:86): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1232 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:56.013977 kernel: audit: type=1307 audit(1734101384.010:86): cwd="/" Dec 13 14:49:56.013997 kernel: audit: type=1302 audit(1734101384.010:86): item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:56.014014 kernel: audit: type=1302 audit(1734101384.010:86): item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:56.014033 kernel: audit: type=1327 audit(1734101384.010:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:49:56.014051 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:49:56.014071 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:56.014089 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:56.014112 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:56.014129 kernel: audit: type=1334 audit(1734101395.713:87): prog-id=12 op=LOAD Dec 13 14:49:56.014146 kernel: audit: type=1334 audit(1734101395.713:88): prog-id=3 op=UNLOAD Dec 13 14:49:56.014196 kernel: audit: type=1334 audit(1734101395.714:89): prog-id=13 op=LOAD Dec 13 14:49:56.014217 kernel: audit: type=1334 audit(1734101395.716:90): prog-id=14 op=LOAD Dec 13 14:49:56.014234 kernel: audit: type=1334 audit(1734101395.716:91): prog-id=4 op=UNLOAD Dec 13 14:49:56.014250 kernel: audit: type=1334 audit(1734101395.716:92): prog-id=5 op=UNLOAD Dec 13 14:49:56.014267 kernel: audit: type=1334 audit(1734101395.721:93): prog-id=15 op=LOAD Dec 13 14:49:56.014286 kernel: audit: type=1334 audit(1734101395.721:94): prog-id=12 op=UNLOAD Dec 13 14:49:56.014302 kernel: audit: type=1334 audit(1734101395.722:95): prog-id=16 op=LOAD Dec 13 14:49:56.014318 kernel: audit: type=1334 audit(1734101395.724:96): prog-id=17 op=LOAD Dec 13 14:49:56.014336 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:49:56.014354 systemd[1]: Stopped iscsiuio.service. Dec 13 14:49:56.014371 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:49:56.014389 systemd[1]: Stopped iscsid.service. Dec 13 14:49:56.014406 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:49:56.014426 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:49:56.014444 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:49:56.014461 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:49:56.014478 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:49:56.014496 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:49:56.014514 systemd[1]: Created slice system-getty.slice. Dec 13 14:49:56.014618 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:49:56.014638 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:49:56.014659 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:49:56.014676 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:49:56.014695 systemd[1]: Created slice user.slice. Dec 13 14:49:56.014713 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:49:56.014733 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:49:56.014745 systemd[1]: Set up automount boot.automount. Dec 13 14:49:56.014757 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:49:56.014768 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:49:56.014781 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:49:56.014795 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:49:56.014807 systemd[1]: Reached target integritysetup.target. Dec 13 14:49:56.014819 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:49:56.014831 systemd[1]: Reached target remote-fs.target. Dec 13 14:49:56.014842 systemd[1]: Reached target slices.target. Dec 13 14:49:56.014854 systemd[1]: Reached target swap.target. Dec 13 14:49:56.014881 systemd[1]: Reached target torcx.target. Dec 13 14:49:56.014900 systemd[1]: Reached target veritysetup.target. Dec 13 14:49:56.014924 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:49:56.014943 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:49:56.014964 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:49:56.014999 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:49:56.015020 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:49:56.015040 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:49:56.015059 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:49:56.015081 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:49:56.015101 systemd[1]: Mounting media.mount... Dec 13 14:49:56.015121 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:56.015139 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:49:56.015162 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:49:56.015273 systemd[1]: Mounting tmp.mount... Dec 13 14:49:56.015294 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:49:56.015314 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:56.015332 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:49:56.015350 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:49:56.015369 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:56.015388 systemd[1]: Starting modprobe@drm.service... Dec 13 14:49:56.015407 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:56.015429 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:49:56.015448 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:56.015466 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:49:56.015485 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:49:56.015566 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:49:56.015585 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:49:56.015605 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:49:56.015624 systemd[1]: Stopped systemd-journald.service. Dec 13 14:49:56.015638 systemd[1]: Starting systemd-journald.service... Dec 13 14:49:56.015653 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:49:56.015666 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:49:56.015677 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:49:56.015689 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:49:56.015700 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:49:56.015711 systemd[1]: Stopped verity-setup.service. Dec 13 14:49:56.015724 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:56.015735 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:49:56.015757 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:49:56.015771 systemd[1]: Mounted media.mount. Dec 13 14:49:56.015783 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:49:56.015795 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:49:56.015806 systemd[1]: Mounted tmp.mount. Dec 13 14:49:56.015818 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:49:56.015832 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:56.015843 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:56.015856 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:49:56.015906 systemd[1]: Finished modprobe@drm.service. Dec 13 14:49:56.015919 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:56.015931 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:56.015943 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:49:56.015955 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:49:56.015967 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:49:56.015979 systemd[1]: Reached target network-pre.target. Dec 13 14:49:56.015994 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:49:56.016016 systemd-journald[1320]: Journal started Dec 13 14:49:56.016095 systemd-journald[1320]: Runtime Journal (/run/log/journal/ec22debc720bbd29ba7ac667ae4c493e) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:49:42.829000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:49:43.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:49:43.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:49:43.246000 audit: BPF prog-id=10 op=LOAD Dec 13 14:49:43.246000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:49:43.246000 audit: BPF prog-id=11 op=LOAD Dec 13 14:49:43.246000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:49:44.002000 audit[1249]: AVC avc: denied { associate } for pid=1249 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:49:44.002000 audit[1249]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1232 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:44.002000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:49:44.010000 audit[1249]: AVC avc: denied { associate } for pid=1249 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:49:44.010000 audit[1249]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1232 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:44.010000 audit: CWD cwd="/" Dec 13 14:49:44.010000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:44.010000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:44.010000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:49:55.713000 audit: BPF prog-id=12 op=LOAD Dec 13 14:49:55.713000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:49:55.714000 audit: BPF prog-id=13 op=LOAD Dec 13 14:49:55.716000 audit: BPF prog-id=14 op=LOAD Dec 13 14:49:55.716000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:49:55.716000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:49:55.721000 audit: BPF prog-id=15 op=LOAD Dec 13 14:49:55.721000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:49:55.722000 audit: BPF prog-id=16 op=LOAD Dec 13 14:49:55.724000 audit: BPF prog-id=17 op=LOAD Dec 13 14:49:55.724000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:49:55.724000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:49:55.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.733000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:49:55.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.911000 audit: BPF prog-id=18 op=LOAD Dec 13 14:49:55.912000 audit: BPF prog-id=19 op=LOAD Dec 13 14:49:55.912000 audit: BPF prog-id=20 op=LOAD Dec 13 14:49:55.912000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:49:55.912000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:49:55.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.003000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:49:56.003000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd2a3c7cd0 a2=4000 a3=7ffd2a3c7d6c items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:56.003000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:49:56.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:55.712760 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:49:43.992110 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:55.727438 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:49:43.992646 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:49:43.992664 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:49:56.020918 kernel: loop: module loaded Dec 13 14:49:43.992696 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:49:43.992707 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:49:43.992735 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:49:43.992747 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:49:43.992949 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:49:43.992990 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:49:43.993003 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:49:43.993957 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:49:43.993991 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:49:56.024904 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:49:43.994008 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:49:43.994023 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:49:43.994040 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:49:43.994053 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:49:54.645115 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:54.645423 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:54.645543 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:54.645747 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:49:54.645804 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:49:54.645893 /usr/lib/systemd/system-generators/torcx-generator[1249]: time="2024-12-13T14:49:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:49:56.031898 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:56.035761 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:49:56.044520 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:49:56.048048 systemd[1]: Started systemd-journald.service. Dec 13 14:49:56.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.052735 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:56.052948 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:56.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.058415 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:49:56.059909 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:56.068312 systemd-journald[1320]: Time spent on flushing to /var/log/journal/ec22debc720bbd29ba7ac667ae4c493e is 114.650ms for 1167 entries. Dec 13 14:49:56.068312 systemd-journald[1320]: System Journal (/var/log/journal/ec22debc720bbd29ba7ac667ae4c493e) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:49:56.196115 systemd-journald[1320]: Received client request to flush runtime journal. Dec 13 14:49:56.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.076109 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:49:56.077354 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:49:56.145935 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:49:56.146127 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:49:56.157363 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:49:56.163668 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:49:56.167819 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:49:56.197371 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:49:56.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.203974 kernel: fuse: init (API version 7.34) Dec 13 14:49:56.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.209915 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:49:56.210162 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:49:56.214798 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:49:56.220524 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:49:56.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.264471 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:49:56.266597 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:49:56.270348 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:49:56.273527 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:49:56.291693 udevadm[1365]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:49:56.957142 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:49:56.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:56.960288 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:49:57.301496 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:49:57.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:57.308056 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:49:57.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:57.308000 audit: BPF prog-id=21 op=LOAD Dec 13 14:49:57.308000 audit: BPF prog-id=22 op=LOAD Dec 13 14:49:57.308000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:49:57.308000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:49:57.311092 systemd[1]: Starting systemd-udevd.service... Dec 13 14:49:57.345207 systemd-udevd[1368]: Using default interface naming scheme 'v252'. Dec 13 14:49:57.467826 systemd[1]: Started systemd-udevd.service. Dec 13 14:49:57.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:57.468000 audit: BPF prog-id=23 op=LOAD Dec 13 14:49:57.473931 systemd[1]: Starting systemd-networkd.service... Dec 13 14:49:57.567148 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:49:57.576710 (udev-worker)[1370]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:49:57.594000 audit: BPF prog-id=24 op=LOAD Dec 13 14:49:57.595000 audit: BPF prog-id=25 op=LOAD Dec 13 14:49:57.595000 audit: BPF prog-id=26 op=LOAD Dec 13 14:49:57.598250 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:49:57.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:57.670212 systemd[1]: Started systemd-userdbd.service. Dec 13 14:49:57.696906 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:49:57.707889 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:49:57.709925 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:49:57.711914 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:49:57.687000 audit[1376]: AVC avc: denied { confidentiality } for pid=1376 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:49:57.687000 audit[1376]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e12fff4040 a1=337fc a2=7f1ab14adbc5 a3=5 items=110 ppid=1368 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.687000 audit: CWD cwd="/" Dec 13 14:49:57.687000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=1 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=2 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=3 name=(null) inode=14394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=4 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=5 name=(null) inode=14395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=6 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=7 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=8 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=9 name=(null) inode=14397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=10 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=11 name=(null) inode=14398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=12 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=13 name=(null) inode=14399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=14 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=15 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=16 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=17 name=(null) inode=14401 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=18 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=19 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=20 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=21 name=(null) inode=14403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=22 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=23 name=(null) inode=14404 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=24 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=25 name=(null) inode=14405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=26 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=27 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=28 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=29 name=(null) inode=14407 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=30 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=31 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=32 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=33 name=(null) inode=14409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=34 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=35 name=(null) inode=14410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=36 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=37 name=(null) inode=14411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=38 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=39 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=40 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=41 name=(null) inode=14413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=42 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=43 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=44 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=45 name=(null) inode=14415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=46 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=47 name=(null) inode=14416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=48 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=49 name=(null) inode=14417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=50 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=51 name=(null) inode=14418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=52 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=53 name=(null) inode=14419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=55 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=56 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=57 name=(null) inode=14421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=58 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=59 name=(null) inode=14422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=60 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=61 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=62 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=63 name=(null) inode=14424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=64 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=65 name=(null) inode=14425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=66 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=67 name=(null) inode=14426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=68 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=69 name=(null) inode=14427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=70 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=71 name=(null) inode=14428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=72 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=73 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=74 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=75 name=(null) inode=14430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=76 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=77 name=(null) inode=14431 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=78 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=79 name=(null) inode=14432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=80 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=81 name=(null) inode=14433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=82 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=83 name=(null) inode=14434 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=84 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=85 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=86 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=87 name=(null) inode=14436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=88 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=89 name=(null) inode=14437 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=90 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=91 name=(null) inode=14438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=92 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=93 name=(null) inode=14439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=94 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=95 name=(null) inode=14440 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=96 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=97 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=98 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=99 name=(null) inode=14442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=100 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=101 name=(null) inode=14443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.751909 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 14:49:57.687000 audit: PATH item=102 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=103 name=(null) inode=14444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=104 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=105 name=(null) inode=14445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=106 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=107 name=(null) inode=14446 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PATH item=109 name=(null) inode=14447 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:57.687000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:49:57.781894 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:49:57.786888 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:49:57.855600 systemd-networkd[1374]: lo: Link UP Dec 13 14:49:57.855616 systemd-networkd[1374]: lo: Gained carrier Dec 13 14:49:57.856230 systemd-networkd[1374]: Enumeration completed Dec 13 14:49:57.856421 systemd[1]: Started systemd-networkd.service. Dec 13 14:49:57.856628 systemd-networkd[1374]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:49:57.862890 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:49:57.863643 systemd-networkd[1374]: eth0: Link UP Dec 13 14:49:57.864047 systemd-networkd[1374]: eth0: Gained carrier Dec 13 14:49:57.871136 systemd-networkd[1374]: eth0: DHCPv4 address 172.31.26.144/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:49:57.885906 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1380) Dec 13 14:49:57.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:57.947762 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:49:57.991901 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:49:57.993266 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:49:57.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:57.995629 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:49:58.422372 lvm[1482]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:49:58.461146 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:49:58.462486 systemd[1]: Reached target cryptsetup.target. Dec 13 14:49:58.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.465151 systemd[1]: Starting lvm2-activation.service... Dec 13 14:49:58.474697 lvm[1483]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:49:58.504606 systemd[1]: Finished lvm2-activation.service. Dec 13 14:49:58.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.505657 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:49:58.506666 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:49:58.506708 systemd[1]: Reached target local-fs.target. Dec 13 14:49:58.507664 systemd[1]: Reached target machines.target. Dec 13 14:49:58.509903 systemd[1]: Starting ldconfig.service... Dec 13 14:49:58.512263 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:58.512340 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:58.515331 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:49:58.517510 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:49:58.520445 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:49:58.527710 systemd[1]: Starting systemd-sysext.service... Dec 13 14:49:58.578169 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1485 (bootctl) Dec 13 14:49:58.586123 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:49:58.617648 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:49:58.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.623736 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:49:58.629726 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:49:58.630030 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:49:58.644905 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:49:58.760997 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:49:58.763272 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:49:58.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.770898 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:49:58.787960 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:49:58.819962 (sd-sysext)[1498]: Using extensions 'kubernetes'. Dec 13 14:49:58.821555 (sd-sysext)[1498]: Merged extensions into '/usr'. Dec 13 14:49:58.826241 systemd-fsck[1495]: fsck.fat 4.2 (2021-01-31) Dec 13 14:49:58.826241 systemd-fsck[1495]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 14:49:58.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.832811 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:49:58.838198 systemd[1]: Mounting boot.mount... Dec 13 14:49:58.857777 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:58.860977 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:49:58.862114 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:58.869044 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:58.873947 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:58.877798 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:58.879462 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:58.879718 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:58.880026 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:58.888114 systemd[1]: Mounted boot.mount. Dec 13 14:49:58.890027 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:58.890208 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:58.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.897089 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:58.897274 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:58.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.899283 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:58.903506 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:49:58.904957 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:58.905137 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:58.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.907575 systemd[1]: Finished systemd-sysext.service. Dec 13 14:49:58.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:58.913320 systemd[1]: Starting ensure-sysext.service... Dec 13 14:49:58.914100 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:58.915878 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:49:58.935404 systemd[1]: Reloading. Dec 13 14:49:58.945643 systemd-tmpfiles[1517]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:49:58.956086 systemd-tmpfiles[1517]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:49:58.966774 systemd-tmpfiles[1517]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:49:59.038561 /usr/lib/systemd/system-generators/torcx-generator[1537]: time="2024-12-13T14:49:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:59.038601 /usr/lib/systemd/system-generators/torcx-generator[1537]: time="2024-12-13T14:49:59Z" level=info msg="torcx already run" Dec 13 14:49:59.163598 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:59.163626 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:59.199312 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:59.350000 audit: BPF prog-id=27 op=LOAD Dec 13 14:49:59.350000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:49:59.350000 audit: BPF prog-id=28 op=LOAD Dec 13 14:49:59.350000 audit: BPF prog-id=29 op=LOAD Dec 13 14:49:59.350000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:49:59.350000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:49:59.357000 audit: BPF prog-id=30 op=LOAD Dec 13 14:49:59.357000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:49:59.358000 audit: BPF prog-id=31 op=LOAD Dec 13 14:49:59.358000 audit: BPF prog-id=32 op=LOAD Dec 13 14:49:59.358000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:49:59.358000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:49:59.360000 audit: BPF prog-id=33 op=LOAD Dec 13 14:49:59.360000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:49:59.360000 audit: BPF prog-id=34 op=LOAD Dec 13 14:49:59.360000 audit: BPF prog-id=35 op=LOAD Dec 13 14:49:59.360000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:49:59.360000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:49:59.369646 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:49:59.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.372411 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:49:59.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.390229 systemd[1]: Starting audit-rules.service... Dec 13 14:49:59.395548 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:49:59.403613 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:49:59.407000 audit: BPF prog-id=36 op=LOAD Dec 13 14:49:59.411852 systemd[1]: Starting systemd-resolved.service... Dec 13 14:49:59.418000 audit: BPF prog-id=37 op=LOAD Dec 13 14:49:59.422636 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:49:59.428420 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:49:59.447764 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.450252 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:59.454960 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:59.459837 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:59.460779 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.461008 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:59.463210 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:59.463754 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:59.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.464000 audit[1601]: SYSTEM_BOOT pid=1601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.469752 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:59.471540 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:59.471718 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:59.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.475825 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:49:59.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.480950 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.483290 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:59.488387 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:49:59.489599 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.489906 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:59.492043 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:59.492232 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:59.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.494385 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:59.494555 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:59.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.496374 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.501770 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.504474 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:49:59.509286 systemd[1]: Starting modprobe@drm.service... Dec 13 14:49:59.511981 systemd[1]: Starting modprobe@loop.service... Dec 13 14:49:59.512990 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.513252 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:49:59.518055 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:49:59.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.519430 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:49:59.520504 systemd[1]: Finished ensure-sysext.service. Dec 13 14:49:59.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.523327 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:49:59.523732 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:49:59.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.532294 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:49:59.532474 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:49:59.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.534040 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:49:59.534215 systemd[1]: Finished modprobe@loop.service. Dec 13 14:49:59.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.535679 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:49:59.535722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:49:59.537155 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:49:59.537328 systemd[1]: Finished modprobe@drm.service. Dec 13 14:49:59.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.571808 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:49:59.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.609969 systemd-networkd[1374]: eth0: Gained IPv6LL Dec 13 14:49:59.616509 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:49:59.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.628097 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:49:59.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:59.631364 systemd[1]: Reached target time-set.target. Dec 13 14:49:59.632392 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:59.632412 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:49:59.631000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:49:59.631000 audit[1619]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd492eb5e0 a2=420 a3=0 items=0 ppid=1590 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.631000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:49:59.633673 augenrules[1619]: No rules Dec 13 14:49:59.634392 systemd[1]: Finished audit-rules.service. Dec 13 14:49:59.648830 systemd-resolved[1594]: Positive Trust Anchors: Dec 13 14:49:59.649234 systemd-resolved[1594]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:49:59.649320 systemd-resolved[1594]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:49:59.804991 systemd-resolved[1594]: Defaulting to hostname 'linux'. Dec 13 14:49:59.806837 systemd[1]: Started systemd-resolved.service. Dec 13 14:49:59.808107 systemd[1]: Reached target network.target. Dec 13 14:49:59.808920 systemd[1]: Reached target network-online.target. Dec 13 14:49:59.810170 systemd[1]: Reached target nss-lookup.target. Dec 13 14:49:59.892476 systemd-timesyncd[1596]: Contacted time server 45.61.187.39:123 (0.flatcar.pool.ntp.org). Dec 13 14:49:59.892555 systemd-timesyncd[1596]: Initial clock synchronization to Fri 2024-12-13 14:49:59.749386 UTC. Dec 13 14:50:02.027353 ldconfig[1484]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:50:02.044761 systemd[1]: Finished ldconfig.service. Dec 13 14:50:02.051530 systemd[1]: Starting systemd-update-done.service... Dec 13 14:50:02.069960 systemd[1]: Finished systemd-update-done.service. Dec 13 14:50:02.071207 systemd[1]: Reached target sysinit.target. Dec 13 14:50:02.075356 systemd[1]: Started motdgen.path. Dec 13 14:50:02.078030 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:50:02.086980 systemd[1]: Started logrotate.timer. Dec 13 14:50:02.088637 systemd[1]: Started mdadm.timer. Dec 13 14:50:02.089441 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:50:02.092041 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:50:02.092085 systemd[1]: Reached target paths.target. Dec 13 14:50:02.095331 systemd[1]: Reached target timers.target. Dec 13 14:50:02.098826 systemd[1]: Listening on dbus.socket. Dec 13 14:50:02.108755 systemd[1]: Starting docker.socket... Dec 13 14:50:02.118161 systemd[1]: Listening on sshd.socket. Dec 13 14:50:02.125931 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:50:02.127246 systemd[1]: Listening on docker.socket. Dec 13 14:50:02.129061 systemd[1]: Reached target sockets.target. Dec 13 14:50:02.133270 systemd[1]: Reached target basic.target. Dec 13 14:50:02.137126 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:50:02.137171 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:50:02.139669 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:50:02.150705 systemd[1]: Starting containerd.service... Dec 13 14:50:02.159273 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:50:02.166437 systemd[1]: Starting dbus.service... Dec 13 14:50:02.187466 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:50:02.206217 systemd[1]: Starting extend-filesystems.service... Dec 13 14:50:02.207885 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:50:02.221244 systemd[1]: Starting kubelet.service... Dec 13 14:50:02.334063 systemd[1]: Starting motdgen.service... Dec 13 14:50:02.410742 systemd[1]: Started nvidia.service. Dec 13 14:50:02.448294 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:50:02.471013 systemd[1]: Starting sshd-keygen.service... Dec 13 14:50:02.665119 jq[1632]: false Dec 13 14:50:02.521056 systemd[1]: Starting systemd-logind.service... Dec 13 14:50:02.521996 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:50:02.522096 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:50:02.526364 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:50:02.539399 systemd[1]: Starting update-engine.service... Dec 13 14:50:02.805532 jq[1643]: true Dec 13 14:50:02.549903 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:50:02.569362 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:50:02.571318 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:50:02.654240 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:50:02.654469 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:50:02.893904 jq[1647]: true Dec 13 14:50:03.030250 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:50:03.031793 systemd[1]: Finished motdgen.service. Dec 13 14:50:03.177175 dbus-daemon[1631]: [system] SELinux support is enabled Dec 13 14:50:03.184775 systemd[1]: Started dbus.service. Dec 13 14:50:03.206818 amazon-ssm-agent[1628]: 2024/12/13 14:50:03 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:50:03.196542 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:50:03.196927 systemd[1]: Reached target system-config.target. Dec 13 14:50:03.199654 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:50:03.199684 systemd[1]: Reached target user-config.target. Dec 13 14:50:03.210376 amazon-ssm-agent[1628]: Initializing new seelog logger Dec 13 14:50:03.210376 amazon-ssm-agent[1628]: New Seelog Logger Creation Complete Dec 13 14:50:03.211657 extend-filesystems[1633]: Found loop1 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p1 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p2 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p3 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found usr Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p4 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p6 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p7 Dec 13 14:50:03.217045 extend-filesystems[1633]: Found nvme0n1p9 Dec 13 14:50:03.217045 extend-filesystems[1633]: Checking size of /dev/nvme0n1p9 Dec 13 14:50:03.250488 amazon-ssm-agent[1628]: 2024/12/13 14:50:03 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:50:03.250488 amazon-ssm-agent[1628]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:50:03.250488 amazon-ssm-agent[1628]: 2024/12/13 14:50:03 processing appconfig overrides Dec 13 14:50:03.259531 bash[1688]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:50:03.260574 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:50:03.301901 dbus-daemon[1631]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1374 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:50:03.318211 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:50:03.350883 extend-filesystems[1633]: Resized partition /dev/nvme0n1p9 Dec 13 14:50:03.372269 extend-filesystems[1698]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:50:03.384909 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:50:03.435741 env[1651]: time="2024-12-13T14:50:03.435661302Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:50:03.490846 systemd-logind[1640]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:50:03.502196 systemd-logind[1640]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:50:03.503207 systemd-logind[1640]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:50:03.518016 systemd-logind[1640]: New seat seat0. Dec 13 14:50:03.528303 systemd[1]: Started systemd-logind.service. Dec 13 14:50:03.538813 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:50:03.558500 extend-filesystems[1698]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:50:03.558500 extend-filesystems[1698]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:50:03.558500 extend-filesystems[1698]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:50:03.567229 extend-filesystems[1633]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:50:03.560497 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:50:03.560722 systemd[1]: Finished extend-filesystems.service. Dec 13 14:50:03.703385 update_engine[1642]: I1213 14:50:03.702322 1642 main.cc:92] Flatcar Update Engine starting Dec 13 14:50:03.710577 systemd[1]: Started update-engine.service. Dec 13 14:50:03.712041 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:50:03.717220 systemd[1]: Started locksmithd.service. Dec 13 14:50:03.719295 update_engine[1642]: I1213 14:50:03.719255 1642 update_check_scheduler.cc:74] Next update check in 11m49s Dec 13 14:50:03.727638 env[1651]: time="2024-12-13T14:50:03.726246962Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:50:03.727638 env[1651]: time="2024-12-13T14:50:03.726456351Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:50:03.731440 env[1651]: time="2024-12-13T14:50:03.731381805Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:50:03.731440 env[1651]: time="2024-12-13T14:50:03.731438057Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:50:03.731881 env[1651]: time="2024-12-13T14:50:03.731821570Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:50:03.734954 env[1651]: time="2024-12-13T14:50:03.734909570Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:50:03.735068 env[1651]: time="2024-12-13T14:50:03.734965519Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:50:03.735068 env[1651]: time="2024-12-13T14:50:03.734982301Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:50:03.735287 env[1651]: time="2024-12-13T14:50:03.735125131Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:50:03.735544 env[1651]: time="2024-12-13T14:50:03.735515087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:50:03.735780 env[1651]: time="2024-12-13T14:50:03.735750487Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:50:03.735844 env[1651]: time="2024-12-13T14:50:03.735781425Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:50:03.735919 env[1651]: time="2024-12-13T14:50:03.735891211Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:50:03.735919 env[1651]: time="2024-12-13T14:50:03.735911518Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:50:03.746851 env[1651]: time="2024-12-13T14:50:03.746780390Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:50:03.747073 env[1651]: time="2024-12-13T14:50:03.746856899Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:50:03.747073 env[1651]: time="2024-12-13T14:50:03.746904338Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:50:03.747073 env[1651]: time="2024-12-13T14:50:03.746972399Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747228 env[1651]: time="2024-12-13T14:50:03.747140188Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747228 env[1651]: time="2024-12-13T14:50:03.747166645Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747228 env[1651]: time="2024-12-13T14:50:03.747186596Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747338 env[1651]: time="2024-12-13T14:50:03.747209452Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747338 env[1651]: time="2024-12-13T14:50:03.747245780Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747338 env[1651]: time="2024-12-13T14:50:03.747269461Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747338 env[1651]: time="2024-12-13T14:50:03.747293972Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.747338 env[1651]: time="2024-12-13T14:50:03.747313520Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:50:03.747517 env[1651]: time="2024-12-13T14:50:03.747480359Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:50:03.747625 env[1651]: time="2024-12-13T14:50:03.747604213Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:50:03.748094 env[1651]: time="2024-12-13T14:50:03.748066115Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:50:03.748357 env[1651]: time="2024-12-13T14:50:03.748303922Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748357 env[1651]: time="2024-12-13T14:50:03.748333512Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:50:03.748453 env[1651]: time="2024-12-13T14:50:03.748422602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748494 env[1651]: time="2024-12-13T14:50:03.748444992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748546 env[1651]: time="2024-12-13T14:50:03.748528753Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748587 env[1651]: time="2024-12-13T14:50:03.748555562Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748587 env[1651]: time="2024-12-13T14:50:03.748576615Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748763 env[1651]: time="2024-12-13T14:50:03.748597178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748763 env[1651]: time="2024-12-13T14:50:03.748617057Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748763 env[1651]: time="2024-12-13T14:50:03.748634561Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.748763 env[1651]: time="2024-12-13T14:50:03.748748509Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:50:03.749369 env[1651]: time="2024-12-13T14:50:03.749339715Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.749421 env[1651]: time="2024-12-13T14:50:03.749381196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.749421 env[1651]: time="2024-12-13T14:50:03.749403903Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.749497 env[1651]: time="2024-12-13T14:50:03.749427928Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:50:03.749497 env[1651]: time="2024-12-13T14:50:03.749451929Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:50:03.749497 env[1651]: time="2024-12-13T14:50:03.749469666Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:50:03.749611 env[1651]: time="2024-12-13T14:50:03.749496949Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:50:03.749611 env[1651]: time="2024-12-13T14:50:03.749542766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:50:03.749946 env[1651]: time="2024-12-13T14:50:03.749836649Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:50:03.753169 env[1651]: time="2024-12-13T14:50:03.749965030Z" level=info msg="Connect containerd service" Dec 13 14:50:03.753169 env[1651]: time="2024-12-13T14:50:03.750016104Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:50:03.753169 env[1651]: time="2024-12-13T14:50:03.751016741Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:50:03.753169 env[1651]: time="2024-12-13T14:50:03.751335489Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:50:03.753169 env[1651]: time="2024-12-13T14:50:03.751473136Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:50:03.753169 env[1651]: time="2024-12-13T14:50:03.752056054Z" level=info msg="containerd successfully booted in 0.317815s" Dec 13 14:50:03.751631 systemd[1]: Started containerd.service. Dec 13 14:50:03.754384 env[1651]: time="2024-12-13T14:50:03.753895728Z" level=info msg="Start subscribing containerd event" Dec 13 14:50:03.754384 env[1651]: time="2024-12-13T14:50:03.753960914Z" level=info msg="Start recovering state" Dec 13 14:50:03.754384 env[1651]: time="2024-12-13T14:50:03.754361441Z" level=info msg="Start event monitor" Dec 13 14:50:03.754384 env[1651]: time="2024-12-13T14:50:03.754380741Z" level=info msg="Start snapshots syncer" Dec 13 14:50:03.754538 env[1651]: time="2024-12-13T14:50:03.754395895Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:50:03.754538 env[1651]: time="2024-12-13T14:50:03.754406687Z" level=info msg="Start streaming server" Dec 13 14:50:04.044303 dbus-daemon[1631]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:50:04.044475 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:50:04.053836 dbus-daemon[1631]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1695 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:50:04.076990 systemd[1]: Starting polkit.service... Dec 13 14:50:04.106605 polkitd[1811]: Started polkitd version 121 Dec 13 14:50:04.168321 polkitd[1811]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:50:04.168407 polkitd[1811]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:50:04.175231 polkitd[1811]: Finished loading, compiling and executing 2 rules Dec 13 14:50:04.177180 dbus-daemon[1631]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:50:04.177404 systemd[1]: Started polkit.service. Dec 13 14:50:04.178292 polkitd[1811]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:50:04.206435 systemd-hostnamed[1695]: Hostname set to (transient) Dec 13 14:50:04.206569 systemd-resolved[1594]: System hostname changed to 'ip-172-31-26-144'. Dec 13 14:50:04.275845 coreos-metadata[1630]: Dec 13 14:50:04.275 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:50:04.287228 coreos-metadata[1630]: Dec 13 14:50:04.287 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:50:04.287897 coreos-metadata[1630]: Dec 13 14:50:04.287 INFO Fetch successful Dec 13 14:50:04.287997 coreos-metadata[1630]: Dec 13 14:50:04.287 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:50:04.296175 coreos-metadata[1630]: Dec 13 14:50:04.296 INFO Fetch successful Dec 13 14:50:04.298066 unknown[1630]: wrote ssh authorized keys file for user: core Dec 13 14:50:04.315505 update-ssh-keys[1827]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:50:04.317266 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:50:04.378294 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Create new startup processor Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing bookkeeping folders Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO removing the completed state files Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing healthcheck folders for long running plugins Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing locations for inventory plugin Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing default location for custom inventory Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing default location for file inventory Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Initializing default location for role inventory Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Init the cloudwatchlogs publisher Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:50:04.378698 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:50:04.379623 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO OS: linux, Arch: amd64 Dec 13 14:50:04.391352 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:50:04.393209 amazon-ssm-agent[1628]: datastore file /var/lib/amazon/ssm/i-0fb229f609fbc095e/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:50:04.492631 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [OfflineService] Starting document processing engine... Dec 13 14:50:04.587478 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:50:04.681971 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:50:04.749805 locksmithd[1767]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:50:04.778371 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [OfflineService] Starting message polling Dec 13 14:50:04.872007 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [OfflineService] Starting send replies to MDS Dec 13 14:50:04.967052 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:50:05.062730 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:50:05.159527 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:50:05.256296 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:50:05.352349 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:50:05.450247 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [instanceID=i-0fb229f609fbc095e] Starting association polling Dec 13 14:50:05.546331 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:50:05.637816 systemd[1]: Started kubelet.service. Dec 13 14:50:05.642796 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:50:05.739746 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:50:05.836751 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:50:05.934115 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:50:06.031248 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:50:06.128939 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:50:06.163178 sshd_keygen[1669]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:50:06.201338 systemd[1]: Finished sshd-keygen.service. Dec 13 14:50:06.203982 systemd[1]: Starting issuegen.service... Dec 13 14:50:06.211089 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:50:06.211298 systemd[1]: Finished issuegen.service. Dec 13 14:50:06.214220 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:50:06.223602 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:50:06.226481 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:50:06.226617 systemd[1]: Started getty@tty1.service. Dec 13 14:50:06.229060 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:50:06.230478 systemd[1]: Reached target getty.target. Dec 13 14:50:06.231383 systemd[1]: Reached target multi-user.target. Dec 13 14:50:06.234208 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:50:06.246146 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:50:06.246423 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:50:06.247577 systemd[1]: Startup finished in 964ms (kernel) + 8.659s (initrd) + 23.600s (userspace) = 33.224s. Dec 13 14:50:06.325088 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0fb229f609fbc095e, requestId: 7fd7adf7-b732-4495-afd3-d039b616d3d8 Dec 13 14:50:06.422915 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] listening reply. Dec 13 14:50:06.521219 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:50:06.620437 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:50:06.720366 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:50:06.780674 kubelet[1836]: E1213 14:50:06.780601 1836 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:50:06.783007 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:50:06.783395 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:50:06.783708 systemd[1]: kubelet.service: Consumed 1.187s CPU time. Dec 13 14:50:06.819036 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:50:06.917936 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:50:07.017473 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:50:07.116683 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:50:07.216163 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0fb229f609fbc095e?role=subscribe&stream=input Dec 13 14:50:07.315689 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0fb229f609fbc095e?role=subscribe&stream=input Dec 13 14:50:07.415651 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:50:07.515753 amazon-ssm-agent[1628]: 2024-12-13 14:50:04 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:50:07.615927 amazon-ssm-agent[1628]: 2024-12-13 14:50:05 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:50:08.903377 systemd[1]: Created slice system-sshd.slice. Dec 13 14:50:08.905239 systemd[1]: Started sshd@0-172.31.26.144:22-139.178.89.65:58122.service. Dec 13 14:50:09.221006 sshd[1857]: Accepted publickey for core from 139.178.89.65 port 58122 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:09.224670 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:09.257368 systemd[1]: Created slice user-500.slice. Dec 13 14:50:09.259366 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:50:09.263786 systemd-logind[1640]: New session 1 of user core. Dec 13 14:50:09.281572 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:50:09.283497 systemd[1]: Starting user@500.service... Dec 13 14:50:09.289740 (systemd)[1860]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:09.400341 systemd[1860]: Queued start job for default target default.target. Dec 13 14:50:09.401559 systemd[1860]: Reached target paths.target. Dec 13 14:50:09.401597 systemd[1860]: Reached target sockets.target. Dec 13 14:50:09.401615 systemd[1860]: Reached target timers.target. Dec 13 14:50:09.401631 systemd[1860]: Reached target basic.target. Dec 13 14:50:09.401756 systemd[1]: Started user@500.service. Dec 13 14:50:09.403428 systemd[1]: Started session-1.scope. Dec 13 14:50:09.404138 systemd[1860]: Reached target default.target. Dec 13 14:50:09.404356 systemd[1860]: Startup finished in 106ms. Dec 13 14:50:09.560077 systemd[1]: Started sshd@1-172.31.26.144:22-139.178.89.65:58132.service. Dec 13 14:50:09.736943 sshd[1869]: Accepted publickey for core from 139.178.89.65 port 58132 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:09.738732 sshd[1869]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:09.746606 systemd[1]: Started session-2.scope. Dec 13 14:50:09.747413 systemd-logind[1640]: New session 2 of user core. Dec 13 14:50:09.875816 sshd[1869]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:09.881327 systemd[1]: sshd@1-172.31.26.144:22-139.178.89.65:58132.service: Deactivated successfully. Dec 13 14:50:09.882337 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:50:09.883153 systemd-logind[1640]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:50:09.884244 systemd-logind[1640]: Removed session 2. Dec 13 14:50:09.902483 systemd[1]: Started sshd@2-172.31.26.144:22-139.178.89.65:58136.service. Dec 13 14:50:10.069419 sshd[1875]: Accepted publickey for core from 139.178.89.65 port 58136 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:10.072646 sshd[1875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:10.083934 systemd-logind[1640]: New session 3 of user core. Dec 13 14:50:10.086539 systemd[1]: Started session-3.scope. Dec 13 14:50:10.224489 sshd[1875]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:10.229011 systemd[1]: sshd@2-172.31.26.144:22-139.178.89.65:58136.service: Deactivated successfully. Dec 13 14:50:10.232290 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:50:10.233852 systemd-logind[1640]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:50:10.236215 systemd-logind[1640]: Removed session 3. Dec 13 14:50:10.250671 systemd[1]: Started sshd@3-172.31.26.144:22-139.178.89.65:58142.service. Dec 13 14:50:10.427642 sshd[1881]: Accepted publickey for core from 139.178.89.65 port 58142 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:10.429278 sshd[1881]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:10.436551 systemd[1]: Started session-4.scope. Dec 13 14:50:10.437259 systemd-logind[1640]: New session 4 of user core. Dec 13 14:50:10.564574 sshd[1881]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:10.569402 systemd[1]: sshd@3-172.31.26.144:22-139.178.89.65:58142.service: Deactivated successfully. Dec 13 14:50:10.570596 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:50:10.571812 systemd-logind[1640]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:50:10.572755 systemd-logind[1640]: Removed session 4. Dec 13 14:50:10.591065 systemd[1]: Started sshd@4-172.31.26.144:22-139.178.89.65:58156.service. Dec 13 14:50:10.759925 sshd[1887]: Accepted publickey for core from 139.178.89.65 port 58156 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:10.761929 sshd[1887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:10.775029 systemd-logind[1640]: New session 5 of user core. Dec 13 14:50:10.776651 systemd[1]: Started session-5.scope. Dec 13 14:50:10.910702 sudo[1890]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:50:10.911068 sudo[1890]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:50:10.919209 dbus-daemon[1631]: \xd0m\x8c?IV: received setenforce notice (enforcing=325295392) Dec 13 14:50:10.922593 sudo[1890]: pam_unix(sudo:session): session closed for user root Dec 13 14:50:10.947125 sshd[1887]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:10.951492 systemd[1]: sshd@4-172.31.26.144:22-139.178.89.65:58156.service: Deactivated successfully. Dec 13 14:50:10.952543 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:50:10.953668 systemd-logind[1640]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:50:10.954752 systemd-logind[1640]: Removed session 5. Dec 13 14:50:10.973645 systemd[1]: Started sshd@5-172.31.26.144:22-139.178.89.65:58166.service. Dec 13 14:50:11.145120 sshd[1894]: Accepted publickey for core from 139.178.89.65 port 58166 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:11.147050 sshd[1894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:11.152934 systemd-logind[1640]: New session 6 of user core. Dec 13 14:50:11.153825 systemd[1]: Started session-6.scope. Dec 13 14:50:11.259283 sudo[1898]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:50:11.260353 sudo[1898]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:50:11.264388 sudo[1898]: pam_unix(sudo:session): session closed for user root Dec 13 14:50:11.277770 sudo[1897]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:50:11.278117 sudo[1897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:50:11.303254 systemd[1]: Stopping audit-rules.service... Dec 13 14:50:11.306000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:50:11.308313 kernel: kauditd_printk_skb: 232 callbacks suppressed Dec 13 14:50:11.308443 kernel: audit: type=1305 audit(1734101411.306:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:50:11.311009 kernel: audit: type=1300 audit(1734101411.306:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd693eeb0 a2=420 a3=0 items=0 ppid=1 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:11.306000 audit[1901]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd693eeb0 a2=420 a3=0 items=0 ppid=1 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:11.311205 auditctl[1901]: No rules Dec 13 14:50:11.312053 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:50:11.312315 systemd[1]: Stopped audit-rules.service. Dec 13 14:50:11.319584 systemd[1]: Starting audit-rules.service... Dec 13 14:50:11.306000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:50:11.328460 kernel: audit: type=1327 audit(1734101411.306:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:50:11.328547 kernel: audit: type=1131 audit(1734101411.311:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.351554 augenrules[1918]: No rules Dec 13 14:50:11.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.352505 systemd[1]: Finished audit-rules.service. Dec 13 14:50:11.354232 sudo[1897]: pam_unix(sudo:session): session closed for user root Dec 13 14:50:11.365612 kernel: audit: type=1130 audit(1734101411.351:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.365733 kernel: audit: type=1106 audit(1734101411.353:215): pid=1897 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.353000 audit[1897]: USER_END pid=1897 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.353000 audit[1897]: CRED_DISP pid=1897 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.386845 kernel: audit: type=1104 audit(1734101411.353:216): pid=1897 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.387586 sshd[1894]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:11.387000 audit[1894]: USER_END pid=1894 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.393099 systemd[1]: sshd@5-172.31.26.144:22-139.178.89.65:58166.service: Deactivated successfully. Dec 13 14:50:11.395692 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:50:11.400264 systemd-logind[1640]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:50:11.402402 systemd-logind[1640]: Removed session 6. Dec 13 14:50:11.424007 kernel: audit: type=1106 audit(1734101411.387:217): pid=1894 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.424300 kernel: audit: type=1104 audit(1734101411.387:218): pid=1894 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.387000 audit[1894]: CRED_DISP pid=1894 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.428733 kernel: audit: type=1131 audit(1734101411.393:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.144:22-139.178.89.65:58166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.144:22-139.178.89.65:58166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.435988 systemd[1]: Started sshd@6-172.31.26.144:22-139.178.89.65:58176.service. Dec 13 14:50:11.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.144:22-139.178.89.65:58176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.618000 audit[1924]: USER_ACCT pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.619577 sshd[1924]: Accepted publickey for core from 139.178.89.65 port 58176 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:11.622000 audit[1924]: CRED_ACQ pid=1924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.622000 audit[1924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa2d4be0 a2=3 a3=0 items=0 ppid=1 pid=1924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:11.622000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:11.624596 sshd[1924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:11.635728 systemd[1]: Started session-7.scope. Dec 13 14:50:11.636651 systemd-logind[1640]: New session 7 of user core. Dec 13 14:50:11.645000 audit[1924]: USER_START pid=1924 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.648000 audit[1926]: CRED_ACQ pid=1926 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:11.745000 audit[1927]: USER_ACCT pid=1927 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.746574 sudo[1927]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:50:11.746000 audit[1927]: CRED_REFR pid=1927 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.747204 sudo[1927]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:50:11.749000 audit[1927]: USER_START pid=1927 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:11.770497 systemd[1]: Starting coreos-metadata.service... Dec 13 14:50:11.924227 coreos-metadata[1931]: Dec 13 14:50:11.923 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:50:11.925762 coreos-metadata[1931]: Dec 13 14:50:11.925 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Dec 13 14:50:11.926618 coreos-metadata[1931]: Dec 13 14:50:11.926 INFO Fetch successful Dec 13 14:50:11.927561 coreos-metadata[1931]: Dec 13 14:50:11.927 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Dec 13 14:50:11.928186 coreos-metadata[1931]: Dec 13 14:50:11.928 INFO Fetch successful Dec 13 14:50:11.928315 coreos-metadata[1931]: Dec 13 14:50:11.928 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Dec 13 14:50:11.928922 coreos-metadata[1931]: Dec 13 14:50:11.928 INFO Fetch successful Dec 13 14:50:11.928922 coreos-metadata[1931]: Dec 13 14:50:11.928 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Dec 13 14:50:11.929775 coreos-metadata[1931]: Dec 13 14:50:11.929 INFO Fetch successful Dec 13 14:50:11.929847 coreos-metadata[1931]: Dec 13 14:50:11.929 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Dec 13 14:50:11.930603 coreos-metadata[1931]: Dec 13 14:50:11.930 INFO Fetch successful Dec 13 14:50:11.930765 coreos-metadata[1931]: Dec 13 14:50:11.930 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Dec 13 14:50:11.931522 coreos-metadata[1931]: Dec 13 14:50:11.931 INFO Fetch successful Dec 13 14:50:11.931581 coreos-metadata[1931]: Dec 13 14:50:11.931 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Dec 13 14:50:11.933215 coreos-metadata[1931]: Dec 13 14:50:11.933 INFO Fetch successful Dec 13 14:50:11.933385 coreos-metadata[1931]: Dec 13 14:50:11.933 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Dec 13 14:50:11.933967 coreos-metadata[1931]: Dec 13 14:50:11.933 INFO Fetch successful Dec 13 14:50:11.946925 systemd[1]: Finished coreos-metadata.service. Dec 13 14:50:11.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:12.905361 systemd[1]: Stopped kubelet.service. Dec 13 14:50:12.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:12.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:12.906009 systemd[1]: kubelet.service: Consumed 1.187s CPU time. Dec 13 14:50:12.908420 systemd[1]: Starting kubelet.service... Dec 13 14:50:12.943481 systemd[1]: Reloading. Dec 13 14:50:13.079172 /usr/lib/systemd/system-generators/torcx-generator[1983]: time="2024-12-13T14:50:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:50:13.082927 /usr/lib/systemd/system-generators/torcx-generator[1983]: time="2024-12-13T14:50:13Z" level=info msg="torcx already run" Dec 13 14:50:13.204105 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:50:13.204130 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:50:13.227838 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit: BPF prog-id=46 op=LOAD Dec 13 14:50:13.310000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit: BPF prog-id=47 op=LOAD Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit: BPF prog-id=48 op=LOAD Dec 13 14:50:13.311000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:50:13.311000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.311000 audit: BPF prog-id=49 op=LOAD Dec 13 14:50:13.311000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit: BPF prog-id=50 op=LOAD Dec 13 14:50:13.314000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit: BPF prog-id=51 op=LOAD Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.314000 audit: BPF prog-id=52 op=LOAD Dec 13 14:50:13.314000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:50:13.314000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.315000 audit: BPF prog-id=53 op=LOAD Dec 13 14:50:13.315000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:50:13.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.318000 audit: BPF prog-id=54 op=LOAD Dec 13 14:50:13.318000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit: BPF prog-id=55 op=LOAD Dec 13 14:50:13.319000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit: BPF prog-id=56 op=LOAD Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.321000 audit: BPF prog-id=57 op=LOAD Dec 13 14:50:13.321000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:50:13.321000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit: BPF prog-id=58 op=LOAD Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.324000 audit: BPF prog-id=59 op=LOAD Dec 13 14:50:13.324000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:50:13.324000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.325000 audit: BPF prog-id=60 op=LOAD Dec 13 14:50:13.325000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit: BPF prog-id=61 op=LOAD Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit: BPF prog-id=62 op=LOAD Dec 13 14:50:13.326000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:50:13.326000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:13.327000 audit: BPF prog-id=63 op=LOAD Dec 13 14:50:13.327000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:50:13.350517 systemd[1]: Started kubelet.service. Dec 13 14:50:13.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:13.354373 systemd[1]: Stopping kubelet.service... Dec 13 14:50:13.354857 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:50:13.355131 systemd[1]: Stopped kubelet.service. Dec 13 14:50:13.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:13.357106 systemd[1]: Starting kubelet.service... Dec 13 14:50:13.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:13.579842 systemd[1]: Started kubelet.service. Dec 13 14:50:13.632482 kubelet[2042]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:50:13.632482 kubelet[2042]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:50:13.632482 kubelet[2042]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:50:13.632983 kubelet[2042]: I1213 14:50:13.632558 2042 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:50:14.318400 kubelet[2042]: I1213 14:50:14.318359 2042 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:50:14.318657 kubelet[2042]: I1213 14:50:14.318644 2042 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:50:14.319365 kubelet[2042]: I1213 14:50:14.319342 2042 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:50:14.392828 kubelet[2042]: I1213 14:50:14.392764 2042 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:50:14.406947 kubelet[2042]: E1213 14:50:14.406878 2042 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:50:14.406947 kubelet[2042]: I1213 14:50:14.406944 2042 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:50:14.412605 kubelet[2042]: I1213 14:50:14.412577 2042 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:50:14.416919 kubelet[2042]: I1213 14:50:14.416877 2042 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:50:14.417332 kubelet[2042]: I1213 14:50:14.417300 2042 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:50:14.417531 kubelet[2042]: I1213 14:50:14.417332 2042 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.26.144","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:50:14.417688 kubelet[2042]: I1213 14:50:14.417538 2042 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:50:14.417688 kubelet[2042]: I1213 14:50:14.417552 2042 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:50:14.417688 kubelet[2042]: I1213 14:50:14.417675 2042 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:50:14.446755 kubelet[2042]: I1213 14:50:14.446699 2042 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:50:14.446755 kubelet[2042]: I1213 14:50:14.446764 2042 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:50:14.447050 kubelet[2042]: I1213 14:50:14.446905 2042 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:50:14.447050 kubelet[2042]: I1213 14:50:14.446926 2042 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:50:14.448379 kubelet[2042]: E1213 14:50:14.448343 2042 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:14.448625 kubelet[2042]: E1213 14:50:14.448393 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:14.454667 kubelet[2042]: I1213 14:50:14.454641 2042 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:50:14.458042 kubelet[2042]: I1213 14:50:14.458017 2042 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:50:14.459221 kubelet[2042]: W1213 14:50:14.459192 2042 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:50:14.460087 kubelet[2042]: I1213 14:50:14.459975 2042 server.go:1269] "Started kubelet" Dec 13 14:50:14.471460 kubelet[2042]: I1213 14:50:14.471404 2042 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:50:14.473246 kubelet[2042]: I1213 14:50:14.473191 2042 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:50:14.483000 audit[2042]: AVC avc: denied { mac_admin } for pid=2042 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.483000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:50:14.483000 audit[2042]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009cde00 a1=c000059548 a2=c0009cddd0 a3=25 items=0 ppid=1 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:50:14.483000 audit[2042]: AVC avc: denied { mac_admin } for pid=2042 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.483000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:50:14.483000 audit[2042]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b600e0 a1=c000059560 a2=c0009cde90 a3=25 items=0 ppid=1 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:50:14.484661 kubelet[2042]: I1213 14:50:14.484083 2042 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:50:14.484661 kubelet[2042]: I1213 14:50:14.484137 2042 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:50:14.484661 kubelet[2042]: I1213 14:50:14.484211 2042 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:50:14.484821 kubelet[2042]: I1213 14:50:14.484035 2042 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:50:14.485045 kubelet[2042]: I1213 14:50:14.485028 2042 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:50:14.488257 kubelet[2042]: I1213 14:50:14.488220 2042 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:50:14.493106 kubelet[2042]: I1213 14:50:14.493078 2042 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:50:14.493260 kubelet[2042]: E1213 14:50:14.493241 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:14.495346 kubelet[2042]: I1213 14:50:14.495319 2042 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:50:14.495673 kubelet[2042]: I1213 14:50:14.495656 2042 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:50:14.498374 kubelet[2042]: W1213 14:50:14.498340 2042 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:50:14.498493 kubelet[2042]: E1213 14:50:14.498386 2042 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:50:14.498493 kubelet[2042]: W1213 14:50:14.498465 2042 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.26.144" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:50:14.498493 kubelet[2042]: E1213 14:50:14.498488 2042 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.26.144\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:50:14.517166 kubelet[2042]: I1213 14:50:14.516952 2042 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:50:14.517401 kubelet[2042]: I1213 14:50:14.517338 2042 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:50:14.524793 kubelet[2042]: E1213 14:50:14.522414 2042 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.26.144.1810c40c7d634860 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.26.144,UID:172.31.26.144,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.26.144,},FirstTimestamp:2024-12-13 14:50:14.4599512 +0000 UTC m=+0.874817524,LastTimestamp:2024-12-13 14:50:14.4599512 +0000 UTC m=+0.874817524,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.26.144,}" Dec 13 14:50:14.527820 kubelet[2042]: I1213 14:50:14.527788 2042 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:50:14.547089 kubelet[2042]: E1213 14:50:14.547025 2042 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.26.144\" not found" node="172.31.26.144" Dec 13 14:50:14.551340 kubelet[2042]: I1213 14:50:14.551312 2042 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:50:14.551340 kubelet[2042]: I1213 14:50:14.551335 2042 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:50:14.551550 kubelet[2042]: I1213 14:50:14.551389 2042 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:50:14.553612 kubelet[2042]: I1213 14:50:14.553573 2042 policy_none.go:49] "None policy: Start" Dec 13 14:50:14.554427 kubelet[2042]: I1213 14:50:14.554408 2042 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:50:14.554527 kubelet[2042]: I1213 14:50:14.554435 2042 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:50:14.573000 audit[2056]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.573000 audit[2056]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe56114c80 a2=0 a3=7ffe56114c6c items=0 ppid=2042 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:50:14.578023 systemd[1]: Created slice kubepods.slice. Dec 13 14:50:14.582000 audit[2060]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.582000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd9578b2f0 a2=0 a3=7ffd9578b2dc items=0 ppid=2042 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:50:14.596488 kubelet[2042]: E1213 14:50:14.596454 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:14.602031 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:50:14.641054 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:50:14.642837 kubelet[2042]: W1213 14:50:14.642790 2042 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective: no such device Dec 13 14:50:14.648196 kubelet[2042]: I1213 14:50:14.648161 2042 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:50:14.648332 kubelet[2042]: I1213 14:50:14.648237 2042 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:50:14.648386 kubelet[2042]: I1213 14:50:14.648372 2042 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:50:14.648425 kubelet[2042]: I1213 14:50:14.648385 2042 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:50:14.647000 audit[2042]: AVC avc: denied { mac_admin } for pid=2042 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:14.647000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:50:14.647000 audit[2042]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cf7230 a1=c000ce7d88 a2=c000cf7200 a3=25 items=0 ppid=1 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:50:14.650888 kubelet[2042]: I1213 14:50:14.650856 2042 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:50:14.601000 audit[2063]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.601000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe487ce250 a2=0 a3=7ffe487ce23c items=0 ppid=2042 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:50:14.655341 kubelet[2042]: E1213 14:50:14.655313 2042 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.26.144\" not found" Dec 13 14:50:14.656000 audit[2068]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.656000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd85f6680 a2=0 a3=7ffdd85f666c items=0 ppid=2042 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:50:14.726000 audit[2073]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.726000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffed05bdea0 a2=0 a3=7ffed05bde8c items=0 ppid=2042 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:50:14.727734 kubelet[2042]: I1213 14:50:14.727687 2042 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:50:14.728000 audit[2074]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:14.728000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff030bb460 a2=0 a3=7fff030bb44c items=0 ppid=2042 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:50:14.728000 audit[2075]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.728000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7c306880 a2=0 a3=7ffe7c30686c items=0 ppid=2042 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:50:14.729979 kubelet[2042]: I1213 14:50:14.729942 2042 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:50:14.730077 kubelet[2042]: I1213 14:50:14.729985 2042 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:50:14.730077 kubelet[2042]: I1213 14:50:14.730005 2042 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:50:14.730235 kubelet[2042]: E1213 14:50:14.730203 2042 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:50:14.731000 audit[2076]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.731000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe89487e70 a2=0 a3=7ffe89487e5c items=0 ppid=2042 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:50:14.732000 audit[2077]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:14.732000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef3faf770 a2=0 a3=7ffef3faf75c items=0 ppid=2042 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:50:14.734000 audit[2078]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:14.734000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7f6b7490 a2=0 a3=7ffd7f6b747c items=0 ppid=2042 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.734000 audit[2079]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:14.734000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc1b810970 a2=0 a3=7ffc1b81095c items=0 ppid=2042 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:50:14.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:50:14.737000 audit[2080]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:14.737000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe06d319c0 a2=0 a3=7ffe06d319ac items=0 ppid=2042 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:14.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:50:14.754628 kubelet[2042]: I1213 14:50:14.754599 2042 kubelet_node_status.go:72] "Attempting to register node" node="172.31.26.144" Dec 13 14:50:14.762166 kubelet[2042]: I1213 14:50:14.762134 2042 kubelet_node_status.go:75] "Successfully registered node" node="172.31.26.144" Dec 13 14:50:14.762166 kubelet[2042]: E1213 14:50:14.762170 2042 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.31.26.144\": node \"172.31.26.144\" not found" Dec 13 14:50:14.774252 kubelet[2042]: E1213 14:50:14.774166 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:14.874954 kubelet[2042]: E1213 14:50:14.874770 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:14.975817 kubelet[2042]: E1213 14:50:14.975772 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.076761 kubelet[2042]: E1213 14:50:15.076713 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.140773 sudo[1927]: pam_unix(sudo:session): session closed for user root Dec 13 14:50:15.139000 audit[1927]: USER_END pid=1927 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:15.140000 audit[1927]: CRED_DISP pid=1927 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:50:15.165000 audit[1924]: USER_END pid=1924 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:15.165000 audit[1924]: CRED_DISP pid=1924 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:15.164894 sshd[1924]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:15.168682 systemd[1]: sshd@6-172.31.26.144:22-139.178.89.65:58176.service: Deactivated successfully. Dec 13 14:50:15.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.144:22-139.178.89.65:58176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:15.171355 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:50:15.172164 systemd-logind[1640]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:50:15.173247 systemd-logind[1640]: Removed session 7. Dec 13 14:50:15.177318 kubelet[2042]: E1213 14:50:15.177284 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.277939 kubelet[2042]: E1213 14:50:15.277895 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.324485 kubelet[2042]: I1213 14:50:15.324443 2042 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:50:15.324893 kubelet[2042]: W1213 14:50:15.324854 2042 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:50:15.324979 kubelet[2042]: W1213 14:50:15.324926 2042 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:50:15.378630 kubelet[2042]: E1213 14:50:15.378580 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.448640 kubelet[2042]: E1213 14:50:15.448523 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:15.479262 kubelet[2042]: E1213 14:50:15.479213 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.579609 kubelet[2042]: E1213 14:50:15.579566 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.680376 kubelet[2042]: E1213 14:50:15.680335 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.781276 kubelet[2042]: E1213 14:50:15.781153 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.881801 kubelet[2042]: E1213 14:50:15.881757 2042 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.26.144\" not found" Dec 13 14:50:15.983123 kubelet[2042]: I1213 14:50:15.983092 2042 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:50:15.983829 env[1651]: time="2024-12-13T14:50:15.983694605Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:50:15.984289 kubelet[2042]: I1213 14:50:15.984272 2042 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:50:16.449681 kubelet[2042]: I1213 14:50:16.449642 2042 apiserver.go:52] "Watching apiserver" Dec 13 14:50:16.449900 kubelet[2042]: E1213 14:50:16.449860 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:16.460136 kubelet[2042]: E1213 14:50:16.460095 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:16.468539 systemd[1]: Created slice kubepods-besteffort-podf743f43c_d762_4935_8c28_b1d668f12c15.slice. Dec 13 14:50:16.489224 systemd[1]: Created slice kubepods-besteffort-pod5a59f619_fcb7_49e9_8a8b_0cd937d1e678.slice. Dec 13 14:50:16.496146 kubelet[2042]: I1213 14:50:16.496119 2042 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:50:16.512206 kubelet[2042]: I1213 14:50:16.512169 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-chgbm\" (UniqueName: \"kubernetes.io/projected/f743f43c-d762-4935-8c28-b1d668f12c15-kube-api-access-chgbm\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512206 kubelet[2042]: I1213 14:50:16.512218 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4422aede-0445-4731-b3b0-fa5487010335-varrun\") pod \"csi-node-driver-sfnz7\" (UID: \"4422aede-0445-4731-b3b0-fa5487010335\") " pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:16.512437 kubelet[2042]: I1213 14:50:16.512244 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4422aede-0445-4731-b3b0-fa5487010335-kubelet-dir\") pod \"csi-node-driver-sfnz7\" (UID: \"4422aede-0445-4731-b3b0-fa5487010335\") " pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:16.512437 kubelet[2042]: I1213 14:50:16.512266 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4422aede-0445-4731-b3b0-fa5487010335-socket-dir\") pod \"csi-node-driver-sfnz7\" (UID: \"4422aede-0445-4731-b3b0-fa5487010335\") " pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:16.512437 kubelet[2042]: I1213 14:50:16.512287 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8x78\" (UniqueName: \"kubernetes.io/projected/4422aede-0445-4731-b3b0-fa5487010335-kube-api-access-x8x78\") pod \"csi-node-driver-sfnz7\" (UID: \"4422aede-0445-4731-b3b0-fa5487010335\") " pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:16.512437 kubelet[2042]: I1213 14:50:16.512307 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5a59f619-fcb7-49e9-8a8b-0cd937d1e678-kube-proxy\") pod \"kube-proxy-d7vgs\" (UID: \"5a59f619-fcb7-49e9-8a8b-0cd937d1e678\") " pod="kube-system/kube-proxy-d7vgs" Dec 13 14:50:16.512437 kubelet[2042]: I1213 14:50:16.512326 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a59f619-fcb7-49e9-8a8b-0cd937d1e678-lib-modules\") pod \"kube-proxy-d7vgs\" (UID: \"5a59f619-fcb7-49e9-8a8b-0cd937d1e678\") " pod="kube-system/kube-proxy-d7vgs" Dec 13 14:50:16.512708 kubelet[2042]: I1213 14:50:16.512346 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f743f43c-d762-4935-8c28-b1d668f12c15-tigera-ca-bundle\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512708 kubelet[2042]: I1213 14:50:16.512369 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-policysync\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512708 kubelet[2042]: I1213 14:50:16.512390 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-var-run-calico\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512708 kubelet[2042]: I1213 14:50:16.512412 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-cni-bin-dir\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512708 kubelet[2042]: I1213 14:50:16.512436 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-flexvol-driver-host\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512984 kubelet[2042]: I1213 14:50:16.512460 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4422aede-0445-4731-b3b0-fa5487010335-registration-dir\") pod \"csi-node-driver-sfnz7\" (UID: \"4422aede-0445-4731-b3b0-fa5487010335\") " pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:16.512984 kubelet[2042]: I1213 14:50:16.512482 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a59f619-fcb7-49e9-8a8b-0cd937d1e678-xtables-lock\") pod \"kube-proxy-d7vgs\" (UID: \"5a59f619-fcb7-49e9-8a8b-0cd937d1e678\") " pod="kube-system/kube-proxy-d7vgs" Dec 13 14:50:16.512984 kubelet[2042]: I1213 14:50:16.512524 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-xtables-lock\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512984 kubelet[2042]: I1213 14:50:16.512553 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-var-lib-calico\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.512984 kubelet[2042]: I1213 14:50:16.512577 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-cni-net-dir\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.513127 kubelet[2042]: I1213 14:50:16.512607 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fkz2n\" (UniqueName: \"kubernetes.io/projected/5a59f619-fcb7-49e9-8a8b-0cd937d1e678-kube-api-access-fkz2n\") pod \"kube-proxy-d7vgs\" (UID: \"5a59f619-fcb7-49e9-8a8b-0cd937d1e678\") " pod="kube-system/kube-proxy-d7vgs" Dec 13 14:50:16.513127 kubelet[2042]: I1213 14:50:16.512631 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f743f43c-d762-4935-8c28-b1d668f12c15-node-certs\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.513127 kubelet[2042]: I1213 14:50:16.512653 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-cni-log-dir\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.513127 kubelet[2042]: I1213 14:50:16.512676 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f743f43c-d762-4935-8c28-b1d668f12c15-lib-modules\") pod \"calico-node-gcwb6\" (UID: \"f743f43c-d762-4935-8c28-b1d668f12c15\") " pod="calico-system/calico-node-gcwb6" Dec 13 14:50:16.615332 kubelet[2042]: I1213 14:50:16.615303 2042 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:50:16.622101 kubelet[2042]: E1213 14:50:16.622063 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.622101 kubelet[2042]: W1213 14:50:16.622097 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.622336 kubelet[2042]: E1213 14:50:16.622128 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.622443 kubelet[2042]: E1213 14:50:16.622429 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.622502 kubelet[2042]: W1213 14:50:16.622445 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.622502 kubelet[2042]: E1213 14:50:16.622466 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.622740 kubelet[2042]: E1213 14:50:16.622725 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.623180 kubelet[2042]: W1213 14:50:16.622740 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.623180 kubelet[2042]: E1213 14:50:16.622752 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.652232 kubelet[2042]: E1213 14:50:16.652202 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.652232 kubelet[2042]: W1213 14:50:16.652230 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.652432 kubelet[2042]: E1213 14:50:16.652256 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.653405 kubelet[2042]: E1213 14:50:16.653382 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.653405 kubelet[2042]: W1213 14:50:16.653404 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.653558 kubelet[2042]: E1213 14:50:16.653423 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.661270 kubelet[2042]: E1213 14:50:16.661215 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.661270 kubelet[2042]: W1213 14:50:16.661240 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.661270 kubelet[2042]: E1213 14:50:16.661266 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.666247 kubelet[2042]: E1213 14:50:16.662672 2042 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:50:16.666247 kubelet[2042]: W1213 14:50:16.662692 2042 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:50:16.666247 kubelet[2042]: E1213 14:50:16.662715 2042 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:50:16.788963 env[1651]: time="2024-12-13T14:50:16.788794033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gcwb6,Uid:f743f43c-d762-4935-8c28-b1d668f12c15,Namespace:calico-system,Attempt:0,}" Dec 13 14:50:16.810355 env[1651]: time="2024-12-13T14:50:16.810266552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d7vgs,Uid:5a59f619-fcb7-49e9-8a8b-0cd937d1e678,Namespace:kube-system,Attempt:0,}" Dec 13 14:50:17.373658 env[1651]: time="2024-12-13T14:50:17.373602350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.374621 env[1651]: time="2024-12-13T14:50:17.374578733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.386931 env[1651]: time="2024-12-13T14:50:17.386809866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.388327 env[1651]: time="2024-12-13T14:50:17.388284694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.390663 env[1651]: time="2024-12-13T14:50:17.390624135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.392945 env[1651]: time="2024-12-13T14:50:17.392832051Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.393960 env[1651]: time="2024-12-13T14:50:17.393927753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.401596 env[1651]: time="2024-12-13T14:50:17.401526829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:17.433206 env[1651]: time="2024-12-13T14:50:17.431835207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:17.433206 env[1651]: time="2024-12-13T14:50:17.431898447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:17.433206 env[1651]: time="2024-12-13T14:50:17.431915286Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:17.433206 env[1651]: time="2024-12-13T14:50:17.432183144Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6141ce54fd8a909e8169572cb4723484ba2e405e34c75bb780b8ef8062afa2e8 pid=2104 runtime=io.containerd.runc.v2 Dec 13 14:50:17.434822 env[1651]: time="2024-12-13T14:50:17.434764089Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:17.435024 env[1651]: time="2024-12-13T14:50:17.434834664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:17.435024 env[1651]: time="2024-12-13T14:50:17.434878656Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:17.435137 env[1651]: time="2024-12-13T14:50:17.435108721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d pid=2115 runtime=io.containerd.runc.v2 Dec 13 14:50:17.450785 kubelet[2042]: E1213 14:50:17.450739 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:17.460551 systemd[1]: Started cri-containerd-5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d.scope. Dec 13 14:50:17.498341 systemd[1]: Started cri-containerd-6141ce54fd8a909e8169572cb4723484ba2e405e34c75bb780b8ef8062afa2e8.scope. Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.511508 kernel: kauditd_printk_skb: 276 callbacks suppressed Dec 13 14:50:17.511675 kernel: audit: type=1400 audit(1734101417.509:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.519911 kernel: audit: type=1400 audit(1734101417.509:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.520017 kernel: audit: type=1400 audit(1734101417.509:463): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.529189 kernel: audit: type=1400 audit(1734101417.509:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.558612 kernel: audit: type=1400 audit(1734101417.509:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.558736 kernel: audit: type=1400 audit(1734101417.509:466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.558802 kernel: audit: type=1400 audit(1734101417.509:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.569981 kernel: audit: type=1400 audit(1734101417.509:468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.570171 kernel: audit: type=1400 audit(1734101417.509:469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.570208 kernel: audit: type=1400 audit(1734101417.509:470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.509000 audit: BPF prog-id=64 op=LOAD Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2115 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561346536313739323533616264303065343830346637633232333833 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2115 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561346536313739323533616264303065343830346637633232333833 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.510000 audit: BPF prog-id=65 op=LOAD Dec 13 14:50:17.510000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003ce260 items=0 ppid=2115 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561346536313739323533616264303065343830346637633232333833 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.514000 audit: BPF prog-id=66 op=LOAD Dec 13 14:50:17.514000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003ce2a8 items=0 ppid=2115 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561346536313739323533616264303065343830346637633232333833 Dec 13 14:50:17.534000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:50:17.534000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.534000 audit: BPF prog-id=67 op=LOAD Dec 13 14:50:17.534000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003ce6b8 items=0 ppid=2115 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561346536313739323533616264303065343830346637633232333833 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit: BPF prog-id=68 op=LOAD Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2104 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343163653534666438613930396538313639353732636234373233 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2104 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343163653534666438613930396538313639353732636234373233 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit: BPF prog-id=69 op=LOAD Dec 13 14:50:17.578000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0001e7210 items=0 ppid=2104 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343163653534666438613930396538313639353732636234373233 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.578000 audit: BPF prog-id=70 op=LOAD Dec 13 14:50:17.578000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0001e7258 items=0 ppid=2104 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343163653534666438613930396538313639353732636234373233 Dec 13 14:50:17.578000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:50:17.579000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:17.579000 audit: BPF prog-id=71 op=LOAD Dec 13 14:50:17.579000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0001e7668 items=0 ppid=2104 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:17.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343163653534666438613930396538313639353732636234373233 Dec 13 14:50:17.595027 env[1651]: time="2024-12-13T14:50:17.594942672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gcwb6,Uid:f743f43c-d762-4935-8c28-b1d668f12c15,Namespace:calico-system,Attempt:0,} returns sandbox id \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\"" Dec 13 14:50:17.602653 env[1651]: time="2024-12-13T14:50:17.602612924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:50:17.617081 env[1651]: time="2024-12-13T14:50:17.617025893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d7vgs,Uid:5a59f619-fcb7-49e9-8a8b-0cd937d1e678,Namespace:kube-system,Attempt:0,} returns sandbox id \"6141ce54fd8a909e8169572cb4723484ba2e405e34c75bb780b8ef8062afa2e8\"" Dec 13 14:50:17.653234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3489647770.mount: Deactivated successfully. Dec 13 14:50:17.730966 kubelet[2042]: E1213 14:50:17.730897 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:18.452836 kubelet[2042]: E1213 14:50:18.452478 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:19.418748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3173311.mount: Deactivated successfully. Dec 13 14:50:19.453557 kubelet[2042]: E1213 14:50:19.453504 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:19.730682 kubelet[2042]: E1213 14:50:19.730534 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:19.769205 env[1651]: time="2024-12-13T14:50:19.769157043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:19.784775 env[1651]: time="2024-12-13T14:50:19.784724024Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:19.792116 env[1651]: time="2024-12-13T14:50:19.792074471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:19.793686 env[1651]: time="2024-12-13T14:50:19.793648246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:19.794275 env[1651]: time="2024-12-13T14:50:19.794242024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:50:19.796119 env[1651]: time="2024-12-13T14:50:19.796089193Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:50:19.797142 env[1651]: time="2024-12-13T14:50:19.797104102Z" level=info msg="CreateContainer within sandbox \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:50:19.811897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3297050416.mount: Deactivated successfully. Dec 13 14:50:19.820374 env[1651]: time="2024-12-13T14:50:19.820323592Z" level=info msg="CreateContainer within sandbox \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5\"" Dec 13 14:50:19.821408 env[1651]: time="2024-12-13T14:50:19.821374334Z" level=info msg="StartContainer for \"e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5\"" Dec 13 14:50:19.849610 systemd[1]: Started cri-containerd-e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5.scope. Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2b606ce018 items=0 ppid=2115 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:19.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366334656234623536646530383235356536653666663334313739 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.867000 audit: BPF prog-id=72 op=LOAD Dec 13 14:50:19.867000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000388208 items=0 ppid=2115 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:19.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366334656234623536646530383235356536653666663334313739 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit: BPF prog-id=73 op=LOAD Dec 13 14:50:19.876000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000388258 items=0 ppid=2115 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:19.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366334656234623536646530383235356536653666663334313739 Dec 13 14:50:19.876000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:50:19.876000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:19.876000 audit: BPF prog-id=74 op=LOAD Dec 13 14:50:19.876000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003882e8 items=0 ppid=2115 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:19.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539366334656234623536646530383235356536653666663334313739 Dec 13 14:50:19.908889 env[1651]: time="2024-12-13T14:50:19.906497548Z" level=info msg="StartContainer for \"e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5\" returns successfully" Dec 13 14:50:19.916027 systemd[1]: cri-containerd-e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5.scope: Deactivated successfully. Dec 13 14:50:19.917000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:50:20.035357 env[1651]: time="2024-12-13T14:50:20.035204828Z" level=info msg="shim disconnected" id=e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5 Dec 13 14:50:20.035357 env[1651]: time="2024-12-13T14:50:20.035268031Z" level=warning msg="cleaning up after shim disconnected" id=e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5 namespace=k8s.io Dec 13 14:50:20.035357 env[1651]: time="2024-12-13T14:50:20.035282432Z" level=info msg="cleaning up dead shim" Dec 13 14:50:20.065847 env[1651]: time="2024-12-13T14:50:20.065398745Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:50:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2227 runtime=io.containerd.runc.v2\n" Dec 13 14:50:20.367029 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e96c4eb4b56de08255e6e6ff34179d997b0c2e6769a92269c2d2c48e2459efb5-rootfs.mount: Deactivated successfully. Dec 13 14:50:20.454766 kubelet[2042]: E1213 14:50:20.454493 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:21.244398 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3689663726.mount: Deactivated successfully. Dec 13 14:50:21.454948 kubelet[2042]: E1213 14:50:21.454907 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:21.732077 kubelet[2042]: E1213 14:50:21.731355 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:22.345248 env[1651]: time="2024-12-13T14:50:22.345043855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:22.347891 env[1651]: time="2024-12-13T14:50:22.347823899Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:22.349669 env[1651]: time="2024-12-13T14:50:22.349631301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:22.351629 env[1651]: time="2024-12-13T14:50:22.351593243Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:22.352190 env[1651]: time="2024-12-13T14:50:22.352152426Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:50:22.354813 env[1651]: time="2024-12-13T14:50:22.354773267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:50:22.355751 env[1651]: time="2024-12-13T14:50:22.355626087Z" level=info msg="CreateContainer within sandbox \"6141ce54fd8a909e8169572cb4723484ba2e405e34c75bb780b8ef8062afa2e8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:50:22.373307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3788330347.mount: Deactivated successfully. Dec 13 14:50:22.385295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount871702565.mount: Deactivated successfully. Dec 13 14:50:22.391707 env[1651]: time="2024-12-13T14:50:22.391651731Z" level=info msg="CreateContainer within sandbox \"6141ce54fd8a909e8169572cb4723484ba2e405e34c75bb780b8ef8062afa2e8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9eec4d17f5940737ebb6c5235fc57c0c9a481832bf5de4a6d8843ef784040567\"" Dec 13 14:50:22.392708 env[1651]: time="2024-12-13T14:50:22.392674554Z" level=info msg="StartContainer for \"9eec4d17f5940737ebb6c5235fc57c0c9a481832bf5de4a6d8843ef784040567\"" Dec 13 14:50:22.429298 systemd[1]: Started cri-containerd-9eec4d17f5940737ebb6c5235fc57c0c9a481832bf5de4a6d8843ef784040567.scope. Dec 13 14:50:22.455347 kubelet[2042]: E1213 14:50:22.455256 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f26dd591688 items=0 ppid=2104 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965656334643137663539343037333765626236633532333566633537 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit: BPF prog-id=75 op=LOAD Dec 13 14:50:22.470000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002187a8 items=0 ppid=2104 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965656334643137663539343037333765626236633532333566633537 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit: BPF prog-id=76 op=LOAD Dec 13 14:50:22.470000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002187f8 items=0 ppid=2104 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965656334643137663539343037333765626236633532333566633537 Dec 13 14:50:22.470000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:50:22.470000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:22.470000 audit: BPF prog-id=77 op=LOAD Dec 13 14:50:22.470000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000218888 items=0 ppid=2104 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965656334643137663539343037333765626236633532333566633537 Dec 13 14:50:22.490670 env[1651]: time="2024-12-13T14:50:22.490618567Z" level=info msg="StartContainer for \"9eec4d17f5940737ebb6c5235fc57c0c9a481832bf5de4a6d8843ef784040567\" returns successfully" Dec 13 14:50:22.678000 audit[2312]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.683677 kernel: kauditd_printk_skb: 191 callbacks suppressed Dec 13 14:50:22.683823 kernel: audit: type=1325 audit(1734101422.678:510): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.678000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf83a03b0 a2=0 a3=7ffdf83a039c items=0 ppid=2263 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.690908 kernel: audit: type=1300 audit(1734101422.678:510): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf83a03b0 a2=0 a3=7ffdf83a039c items=0 ppid=2263 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:50:22.683000 audit[2313]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.696429 kernel: audit: type=1327 audit(1734101422.678:510): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:50:22.696535 kernel: audit: type=1325 audit(1734101422.683:511): table=nat:15 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.701874 kernel: audit: type=1300 audit(1734101422.683:511): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeda208c40 a2=0 a3=7ffeda208c2c items=0 ppid=2263 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.683000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeda208c40 a2=0 a3=7ffeda208c2c items=0 ppid=2263 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:50:22.683000 audit[2314]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.709230 kernel: audit: type=1327 audit(1734101422.683:511): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:50:22.709349 kernel: audit: type=1325 audit(1734101422.683:512): table=filter:16 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.709378 kernel: audit: type=1300 audit(1734101422.683:512): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ef62a40 a2=0 a3=7ffc1ef62a2c items=0 ppid=2263 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.683000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ef62a40 a2=0 a3=7ffc1ef62a2c items=0 ppid=2263 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:50:22.716761 kernel: audit: type=1327 audit(1734101422.683:512): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:50:22.716888 kernel: audit: type=1325 audit(1734101422.683:513): table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:22.683000 audit[2315]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:22.683000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5b2b4440 a2=0 a3=7ffc5b2b442c items=0 ppid=2263 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:50:22.688000 audit[2316]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:22.688000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0d100a90 a2=0 a3=7ffe0d100a7c items=0 ppid=2263 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:50:22.689000 audit[2317]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:22.689000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7a7a8140 a2=0 a3=7fff7a7a812c items=0 ppid=2263 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:50:22.794000 audit[2318]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.794000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffffaa00070 a2=0 a3=7ffffaa0005c items=0 ppid=2263 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:50:22.798000 audit[2320]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.798000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd8b4f2e20 a2=0 a3=7ffd8b4f2e0c items=0 ppid=2263 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:50:22.806000 audit[2323]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.806000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff136f6370 a2=0 a3=7fff136f635c items=0 ppid=2263 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:50:22.813000 audit[2324]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.813000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf00fc730 a2=0 a3=7ffcf00fc71c items=0 ppid=2263 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:50:22.817000 audit[2326]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.817000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed00e5440 a2=0 a3=7ffed00e542c items=0 ppid=2263 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:50:22.819000 audit[2327]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.819000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2887c5f0 a2=0 a3=7ffe2887c5dc items=0 ppid=2263 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:50:22.823000 audit[2329]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.823000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcad98bf40 a2=0 a3=7ffcad98bf2c items=0 ppid=2263 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:50:22.828000 audit[2332]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.828000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd250aad80 a2=0 a3=7ffd250aad6c items=0 ppid=2263 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:50:22.830000 audit[2333]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.830000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcca38ac40 a2=0 a3=7ffcca38ac2c items=0 ppid=2263 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:50:22.835000 audit[2335]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.835000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdab82e630 a2=0 a3=7ffdab82e61c items=0 ppid=2263 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:50:22.839000 audit[2336]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.839000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd25e6af20 a2=0 a3=7ffd25e6af0c items=0 ppid=2263 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:50:22.842000 audit[2338]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.842000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3e1e6250 a2=0 a3=7ffc3e1e623c items=0 ppid=2263 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:50:22.848000 audit[2341]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.848000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffce5af870 a2=0 a3=7fffce5af85c items=0 ppid=2263 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:50:22.854000 audit[2344]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.854000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4d35b9f0 a2=0 a3=7ffd4d35b9dc items=0 ppid=2263 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:50:22.856000 audit[2345]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.856000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd20dd55f0 a2=0 a3=7ffd20dd55dc items=0 ppid=2263 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:50:22.859000 audit[2347]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.859000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc2fb5c1f0 a2=0 a3=7ffc2fb5c1dc items=0 ppid=2263 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:50:22.915000 audit[2351]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.915000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffc442c0f0 a2=0 a3=7fffc442c0dc items=0 ppid=2263 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:50:22.921000 audit[2352]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.921000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd492b8ed0 a2=0 a3=7ffd492b8ebc items=0 ppid=2263 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:50:22.928000 audit[2354]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:50:22.928000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda3060cf0 a2=0 a3=7ffda3060cdc items=0 ppid=2263 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:50:22.984000 audit[2360]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:22.984000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffdab84e10 a2=0 a3=7fffdab84dfc items=0 ppid=2263 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:22.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:23.027000 audit[2360]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:23.027000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fffdab84e10 a2=0 a3=7fffdab84dfc items=0 ppid=2263 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:23.050000 audit[2369]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.050000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd4766f780 a2=0 a3=7ffd4766f76c items=0 ppid=2263 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:50:23.055000 audit[2371]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.055000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcfbd82470 a2=0 a3=7ffcfbd8245c items=0 ppid=2263 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:50:23.062000 audit[2374]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.062000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd09895330 a2=0 a3=7ffd0989531c items=0 ppid=2263 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:50:23.067000 audit[2375]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.067000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4d5b7d70 a2=0 a3=7fff4d5b7d5c items=0 ppid=2263 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:50:23.082000 audit[2377]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.082000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc84495d60 a2=0 a3=7ffc84495d4c items=0 ppid=2263 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:50:23.085000 audit[2378]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.085000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfbac7430 a2=0 a3=7ffdfbac741c items=0 ppid=2263 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:50:23.089000 audit[2380]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.089000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7e0135d0 a2=0 a3=7ffc7e0135bc items=0 ppid=2263 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:50:23.094000 audit[2383]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.094000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc0c538e40 a2=0 a3=7ffc0c538e2c items=0 ppid=2263 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:50:23.096000 audit[2384]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.096000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffceeeb990 a2=0 a3=7fffceeeb97c items=0 ppid=2263 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:50:23.100000 audit[2386]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.100000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4fe62f10 a2=0 a3=7fff4fe62efc items=0 ppid=2263 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:50:23.102000 audit[2387]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.102000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd765cee20 a2=0 a3=7ffd765cee0c items=0 ppid=2263 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:50:23.106000 audit[2389]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.106000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe932bc580 a2=0 a3=7ffe932bc56c items=0 ppid=2263 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:50:23.111000 audit[2392]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.111000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd8b96fc0 a2=0 a3=7ffdd8b96fac items=0 ppid=2263 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:50:23.121000 audit[2395]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.121000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff29fd71e0 a2=0 a3=7fff29fd71cc items=0 ppid=2263 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:50:23.128000 audit[2396]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.128000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1e3afe10 a2=0 a3=7ffe1e3afdfc items=0 ppid=2263 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:50:23.131000 audit[2398]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.131000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc1b052c10 a2=0 a3=7ffc1b052bfc items=0 ppid=2263 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:50:23.136000 audit[2401]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.136000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffedb26ad90 a2=0 a3=7ffedb26ad7c items=0 ppid=2263 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:50:23.138000 audit[2402]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.138000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde197b670 a2=0 a3=7ffde197b65c items=0 ppid=2263 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:50:23.143000 audit[2404]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.143000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffebd3b5b90 a2=0 a3=7ffebd3b5b7c items=0 ppid=2263 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:50:23.145000 audit[2405]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.145000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe96d2e710 a2=0 a3=7ffe96d2e6fc items=0 ppid=2263 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:50:23.149000 audit[2407]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.149000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd47efb7b0 a2=0 a3=7ffd47efb79c items=0 ppid=2263 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:50:23.158000 audit[2410]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:50:23.158000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff963cce80 a2=0 a3=7fff963cce6c items=0 ppid=2263 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:50:23.163000 audit[2412]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:50:23.163000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffea994f4b0 a2=0 a3=7ffea994f49c items=0 ppid=2263 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.163000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:23.164000 audit[2412]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:50:23.164000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffea994f4b0 a2=0 a3=7ffea994f49c items=0 ppid=2263 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:23.164000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:23.456521 kubelet[2042]: E1213 14:50:23.456475 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:23.731168 kubelet[2042]: E1213 14:50:23.731032 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:24.457192 kubelet[2042]: E1213 14:50:24.457152 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:25.457361 kubelet[2042]: E1213 14:50:25.457309 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:25.732684 kubelet[2042]: E1213 14:50:25.731608 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:26.458327 kubelet[2042]: E1213 14:50:26.458288 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:27.459295 kubelet[2042]: E1213 14:50:27.459246 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:27.732200 kubelet[2042]: E1213 14:50:27.731658 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:28.459472 kubelet[2042]: E1213 14:50:28.459403 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:28.577349 env[1651]: time="2024-12-13T14:50:28.577251501Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:28.580341 env[1651]: time="2024-12-13T14:50:28.580298312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:28.583952 env[1651]: time="2024-12-13T14:50:28.582598897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:28.587475 env[1651]: time="2024-12-13T14:50:28.587375754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:28.588609 env[1651]: time="2024-12-13T14:50:28.588566385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:50:28.606639 env[1651]: time="2024-12-13T14:50:28.606589181Z" level=info msg="CreateContainer within sandbox \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:50:28.645805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2476875775.mount: Deactivated successfully. Dec 13 14:50:28.652044 env[1651]: time="2024-12-13T14:50:28.651992383Z" level=info msg="CreateContainer within sandbox \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b\"" Dec 13 14:50:28.653103 env[1651]: time="2024-12-13T14:50:28.653066356Z" level=info msg="StartContainer for \"1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b\"" Dec 13 14:50:28.691353 systemd[1]: Started cri-containerd-1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b.scope. Dec 13 14:50:28.728955 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 14:50:28.729154 kernel: audit: type=1400 audit(1734101428.715:561): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.729211 kernel: audit: type=1300 audit(1734101428.715:561): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f630b2b8778 items=0 ppid=2115 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f630b2b8778 items=0 ppid=2115 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:28.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616433326663383538353937373230613739346561633362643366 Dec 13 14:50:28.735558 kernel: audit: type=1327 audit(1734101428.715:561): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616433326663383538353937373230613739346561633362643366 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.747723 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.747847 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.747979 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.756626 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.756752 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.764541 env[1651]: time="2024-12-13T14:50:28.764496075Z" level=info msg="StartContainer for \"1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b\" returns successfully" Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.782969 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.783101 kernel: audit: type=1400 audit(1734101428.715:562): avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.715000 audit: BPF prog-id=78 op=LOAD Dec 13 14:50:28.715000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fb418 items=0 ppid=2115 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:28.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616433326663383538353937373230613739346561633362643366 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.721000 audit: BPF prog-id=79 op=LOAD Dec 13 14:50:28.721000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002fb468 items=0 ppid=2115 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:28.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616433326663383538353937373230613739346561633362643366 Dec 13 14:50:28.728000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:50:28.728000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:28.728000 audit: BPF prog-id=80 op=LOAD Dec 13 14:50:28.728000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002fb4f8 items=0 ppid=2115 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:28.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163616433326663383538353937373230613739346561633362643366 Dec 13 14:50:28.807008 kubelet[2042]: I1213 14:50:28.806813 2042 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-d7vgs" podStartSLOduration=10.079008239 podStartE2EDuration="14.806798055s" podCreationTimestamp="2024-12-13 14:50:14 +0000 UTC" firstStartedPulling="2024-12-13 14:50:17.62562182 +0000 UTC m=+4.040488125" lastFinishedPulling="2024-12-13 14:50:22.353411623 +0000 UTC m=+8.768277941" observedRunningTime="2024-12-13 14:50:22.775991596 +0000 UTC m=+9.190857924" watchObservedRunningTime="2024-12-13 14:50:28.806798055 +0000 UTC m=+15.221664411" Dec 13 14:50:29.460380 kubelet[2042]: E1213 14:50:29.460297 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:29.473643 env[1651]: time="2024-12-13T14:50:29.473539427Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:50:29.475816 systemd[1]: cri-containerd-1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b.scope: Deactivated successfully. Dec 13 14:50:29.479000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:50:29.482739 kubelet[2042]: I1213 14:50:29.482709 2042 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:50:29.638894 systemd[1]: run-containerd-runc-k8s.io-1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b-runc.Nt29hj.mount: Deactivated successfully. Dec 13 14:50:29.639177 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b-rootfs.mount: Deactivated successfully. Dec 13 14:50:29.736314 systemd[1]: Created slice kubepods-besteffort-pod4422aede_0445_4731_b3b0_fa5487010335.slice. Dec 13 14:50:29.739926 env[1651]: time="2024-12-13T14:50:29.739831576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sfnz7,Uid:4422aede-0445-4731-b3b0-fa5487010335,Namespace:calico-system,Attempt:0,}" Dec 13 14:50:29.934148 env[1651]: time="2024-12-13T14:50:29.934092954Z" level=info msg="shim disconnected" id=1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b Dec 13 14:50:29.934148 env[1651]: time="2024-12-13T14:50:29.934143549Z" level=warning msg="cleaning up after shim disconnected" id=1cad32fc858597720a794eac3bd3faf8ed0c1801b357971e451c8ad80a21ce5b namespace=k8s.io Dec 13 14:50:29.934148 env[1651]: time="2024-12-13T14:50:29.934155755Z" level=info msg="cleaning up dead shim" Dec 13 14:50:29.959413 env[1651]: time="2024-12-13T14:50:29.959367379Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:50:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2460 runtime=io.containerd.runc.v2\n" Dec 13 14:50:30.028034 env[1651]: time="2024-12-13T14:50:30.027841120Z" level=error msg="Failed to destroy network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:30.036165 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922-shm.mount: Deactivated successfully. Dec 13 14:50:30.040231 env[1651]: time="2024-12-13T14:50:30.040159330Z" level=error msg="encountered an error cleaning up failed sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:30.040382 env[1651]: time="2024-12-13T14:50:30.040246862Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sfnz7,Uid:4422aede-0445-4731-b3b0-fa5487010335,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:30.043706 kubelet[2042]: E1213 14:50:30.043396 2042 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:30.043941 kubelet[2042]: E1213 14:50:30.043748 2042 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:30.043941 kubelet[2042]: E1213 14:50:30.043779 2042 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sfnz7" Dec 13 14:50:30.043941 kubelet[2042]: E1213 14:50:30.043836 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-sfnz7_calico-system(4422aede-0445-4731-b3b0-fa5487010335)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-sfnz7_calico-system(4422aede-0445-4731-b3b0-fa5487010335)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:30.461269 kubelet[2042]: E1213 14:50:30.461204 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:30.791859 env[1651]: time="2024-12-13T14:50:30.791514322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:50:30.794279 kubelet[2042]: I1213 14:50:30.794220 2042 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:50:30.796234 env[1651]: time="2024-12-13T14:50:30.796194130Z" level=info msg="StopPodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\"" Dec 13 14:50:30.839390 env[1651]: time="2024-12-13T14:50:30.839331735Z" level=error msg="StopPodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" failed" error="failed to destroy network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:30.839832 kubelet[2042]: E1213 14:50:30.839786 2042 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:50:30.839963 kubelet[2042]: E1213 14:50:30.839857 2042 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922"} Dec 13 14:50:30.839963 kubelet[2042]: E1213 14:50:30.839949 2042 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4422aede-0445-4731-b3b0-fa5487010335\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:50:30.840084 kubelet[2042]: E1213 14:50:30.839981 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4422aede-0445-4731-b3b0-fa5487010335\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sfnz7" podUID="4422aede-0445-4731-b3b0-fa5487010335" Dec 13 14:50:31.462232 kubelet[2042]: E1213 14:50:31.462179 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:32.463561 kubelet[2042]: E1213 14:50:32.463295 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:33.464648 kubelet[2042]: E1213 14:50:33.464608 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:33.729363 systemd[1]: Created slice kubepods-besteffort-podfb855efb_f9d4_4f23_877c_29c2a6f70731.slice. Dec 13 14:50:33.819975 kubelet[2042]: I1213 14:50:33.819929 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8rw7\" (UniqueName: \"kubernetes.io/projected/fb855efb-f9d4-4f23-877c-29c2a6f70731-kube-api-access-m8rw7\") pod \"nginx-deployment-8587fbcb89-pv9nl\" (UID: \"fb855efb-f9d4-4f23-877c-29c2a6f70731\") " pod="default/nginx-deployment-8587fbcb89-pv9nl" Dec 13 14:50:34.039058 env[1651]: time="2024-12-13T14:50:34.038623340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pv9nl,Uid:fb855efb-f9d4-4f23-877c-29c2a6f70731,Namespace:default,Attempt:0,}" Dec 13 14:50:34.239409 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:50:34.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:34.245897 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:50:34.245988 kernel: audit: type=1131 audit(1734101434.238:568): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:34.263000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:50:34.263000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:50:34.267711 kernel: audit: type=1334 audit(1734101434.263:569): prog-id=52 op=UNLOAD Dec 13 14:50:34.267874 kernel: audit: type=1334 audit(1734101434.263:570): prog-id=51 op=UNLOAD Dec 13 14:50:34.267912 kernel: audit: type=1334 audit(1734101434.263:571): prog-id=50 op=UNLOAD Dec 13 14:50:34.263000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:50:34.414645 env[1651]: time="2024-12-13T14:50:34.414582980Z" level=error msg="Failed to destroy network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:34.418500 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb-shm.mount: Deactivated successfully. Dec 13 14:50:34.422437 env[1651]: time="2024-12-13T14:50:34.422375395Z" level=error msg="encountered an error cleaning up failed sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:34.422749 env[1651]: time="2024-12-13T14:50:34.422704876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pv9nl,Uid:fb855efb-f9d4-4f23-877c-29c2a6f70731,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:34.424297 kubelet[2042]: E1213 14:50:34.423124 2042 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:34.424297 kubelet[2042]: E1213 14:50:34.423204 2042 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-pv9nl" Dec 13 14:50:34.424297 kubelet[2042]: E1213 14:50:34.423232 2042 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-pv9nl" Dec 13 14:50:34.424592 kubelet[2042]: E1213 14:50:34.423283 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-pv9nl_default(fb855efb-f9d4-4f23-877c-29c2a6f70731)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-pv9nl_default(fb855efb-f9d4-4f23-877c-29c2a6f70731)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-pv9nl" podUID="fb855efb-f9d4-4f23-877c-29c2a6f70731" Dec 13 14:50:34.450335 kubelet[2042]: E1213 14:50:34.450263 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:34.465914 kubelet[2042]: E1213 14:50:34.465662 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:34.807805 kubelet[2042]: I1213 14:50:34.807708 2042 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:50:34.808765 env[1651]: time="2024-12-13T14:50:34.808727174Z" level=info msg="StopPodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\"" Dec 13 14:50:34.872692 env[1651]: time="2024-12-13T14:50:34.872564997Z" level=error msg="StopPodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" failed" error="failed to destroy network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:50:34.874397 kubelet[2042]: E1213 14:50:34.874352 2042 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:50:34.874545 kubelet[2042]: E1213 14:50:34.874422 2042 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb"} Dec 13 14:50:34.874545 kubelet[2042]: E1213 14:50:34.874466 2042 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fb855efb-f9d4-4f23-877c-29c2a6f70731\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:50:34.874545 kubelet[2042]: E1213 14:50:34.874496 2042 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fb855efb-f9d4-4f23-877c-29c2a6f70731\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-pv9nl" podUID="fb855efb-f9d4-4f23-877c-29c2a6f70731" Dec 13 14:50:35.466480 kubelet[2042]: E1213 14:50:35.466399 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:35.729944 amazon-ssm-agent[1628]: 2024-12-13 14:50:35 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:50:36.466857 kubelet[2042]: E1213 14:50:36.466814 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:37.467769 kubelet[2042]: E1213 14:50:37.467728 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:38.468709 kubelet[2042]: E1213 14:50:38.468641 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:39.469495 kubelet[2042]: E1213 14:50:39.469424 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:39.999541 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2008181135.mount: Deactivated successfully. Dec 13 14:50:40.057424 env[1651]: time="2024-12-13T14:50:40.057374387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:40.060653 env[1651]: time="2024-12-13T14:50:40.060592720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:40.068123 env[1651]: time="2024-12-13T14:50:40.068073069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:40.072069 env[1651]: time="2024-12-13T14:50:40.072022752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:40.074051 env[1651]: time="2024-12-13T14:50:40.072956404Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:50:40.113853 env[1651]: time="2024-12-13T14:50:40.113805923Z" level=info msg="CreateContainer within sandbox \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:50:40.133190 env[1651]: time="2024-12-13T14:50:40.133133821Z" level=info msg="CreateContainer within sandbox \"5a4e6179253abd00e4804f7c223832f79f7e4c4fc56c46a86ac2559521b8195d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a\"" Dec 13 14:50:40.133939 env[1651]: time="2024-12-13T14:50:40.133884786Z" level=info msg="StartContainer for \"aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a\"" Dec 13 14:50:40.158829 systemd[1]: Started cri-containerd-aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a.scope. Dec 13 14:50:40.193457 kernel: audit: type=1400 audit(1734101440.184:572): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193614 kernel: audit: type=1300 audit(1734101440.184:572): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7c66c6cd88 items=0 ppid=2115 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7c66c6cd88 items=0 ppid=2115 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373639353735313539313231643565343966646131383238373665 Dec 13 14:50:40.198914 kernel: audit: type=1327 audit(1734101440.184:572): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373639353735313539313231643565343966646131383238373665 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.203244 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.210499 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.210605 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.213964 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.219541 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.220559 env[1651]: time="2024-12-13T14:50:40.220509868Z" level=info msg="StartContainer for \"aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a\" returns successfully" Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.238545 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.238689 kernel: audit: type=1400 audit(1734101440.184:573): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.184000 audit: BPF prog-id=81 op=LOAD Dec 13 14:50:40.184000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009a4d8 items=0 ppid=2115 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373639353735313539313231643565343966646131383238373665 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.188000 audit: BPF prog-id=82 op=LOAD Dec 13 14:50:40.188000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009a528 items=0 ppid=2115 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:40.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373639353735313539313231643565343966646131383238373665 Dec 13 14:50:40.193000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:50:40.193000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:40.193000 audit: BPF prog-id=83 op=LOAD Dec 13 14:50:40.193000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009a5b8 items=0 ppid=2115 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:40.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373639353735313539313231643565343966646131383238373665 Dec 13 14:50:40.417351 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:50:40.417502 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:50:40.469678 kubelet[2042]: E1213 14:50:40.469573 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:41.470257 kubelet[2042]: E1213 14:50:41.470204 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:41.992000 audit[2696]: AVC avc: denied { write } for pid=2696 comm="tee" name="fd" dev="proc" ino=19294 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:41.996000 audit[2692]: AVC avc: denied { write } for pid=2692 comm="tee" name="fd" dev="proc" ino=19297 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:42.012000 audit[2710]: AVC avc: denied { write } for pid=2710 comm="tee" name="fd" dev="proc" ino=19992 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:42.012000 audit[2710]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1e625a1b a2=241 a3=1b6 items=1 ppid=2665 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.012000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:50:42.018000 audit[2708]: AVC avc: denied { write } for pid=2708 comm="tee" name="fd" dev="proc" ino=19998 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:42.018000 audit[2708]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1f582a1b a2=241 a3=1b6 items=1 ppid=2666 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.019000 audit[2694]: AVC avc: denied { write } for pid=2694 comm="tee" name="fd" dev="proc" ino=19301 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:42.019000 audit[2694]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd20564a1c a2=241 a3=1b6 items=1 ppid=2663 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.019000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:50:42.019000 audit: PATH item=0 name="/dev/fd/63" inode=19286 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:42.019000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:41.996000 audit[2692]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb0670a1b a2=241 a3=1b6 items=1 ppid=2661 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.992000 audit[2696]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed27ea0b a2=241 a3=1b6 items=1 ppid=2669 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:41.996000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:50:41.996000 audit: PATH item=0 name="/dev/fd/63" inode=19977 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:41.996000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:41.992000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:50:41.992000 audit: PATH item=0 name="/dev/fd/63" inode=19982 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:41.992000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:42.031000 audit[2721]: AVC avc: denied { write } for pid=2721 comm="tee" name="fd" dev="proc" ino=19307 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:42.031000 audit[2721]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2e611a0c a2=241 a3=1b6 items=1 ppid=2673 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.031000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:50:42.031000 audit: PATH item=0 name="/dev/fd/63" inode=19989 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:42.031000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:42.036000 audit[2725]: AVC avc: denied { write } for pid=2725 comm="tee" name="fd" dev="proc" ino=19311 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:50:42.036000 audit[2725]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd114dba1d a2=241 a3=1b6 items=1 ppid=2681 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.036000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:50:42.036000 audit: PATH item=0 name="/dev/fd/63" inode=19300 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:42.036000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:42.018000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:50:42.018000 audit: PATH item=0 name="/dev/fd/63" inode=19289 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:42.018000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:42.012000 audit: PATH item=0 name="/dev/fd/63" inode=19987 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:50:42.012000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.453000 audit: BPF prog-id=84 op=LOAD Dec 13 14:50:42.453000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe15d1fc0 a2=98 a3=3 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.454000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit: BPF prog-id=85 op=LOAD Dec 13 14:50:42.454000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe15d1da0 a2=74 a3=540051 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.454000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.454000 audit: BPF prog-id=86 op=LOAD Dec 13 14:50:42.454000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe15d1dd0 a2=94 a3=2 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.454000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:50:42.470373 kubelet[2042]: E1213 14:50:42.470305 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.613000 audit: BPF prog-id=87 op=LOAD Dec 13 14:50:42.613000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe15d1c90 a2=40 a3=1 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.613000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.614000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:50:42.614000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.614000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffe15d1d60 a2=50 a3=7fffe15d1e40 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.614000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe15d1ca0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe15d1cd0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe15d1be0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe15d1cf0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe15d1cd0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe15d1cc0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe15d1cf0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe15d1cd0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe15d1cf0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe15d1cc0 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe15d1d30 a2=28 a3=0 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe15d1ae0 a2=50 a3=1 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit: BPF prog-id=88 op=LOAD Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe15d1ae0 a2=94 a3=5 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe15d1b90 a2=50 a3=1 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffe15d1cb0 a2=4 a3=38 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.627000 audit[2771]: AVC avc: denied { confidentiality } for pid=2771 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:42.627000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe15d1d00 a2=94 a3=6 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { confidentiality } for pid=2771 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:42.628000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe15d14b0 a2=94 a3=83 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.628000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.628000 audit[2771]: AVC avc: denied { confidentiality } for pid=2771 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:42.628000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe15d14b0 a2=94 a3=83 items=0 ppid=2662 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.628000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit: BPF prog-id=89 op=LOAD Dec 13 14:50:42.640000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2d32f940 a2=98 a3=1999999999999999 items=0 ppid=2662 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.640000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:50:42.640000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit: BPF prog-id=90 op=LOAD Dec 13 14:50:42.640000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2d32f820 a2=74 a3=ffff items=0 ppid=2662 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.640000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:50:42.640000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.640000 audit: BPF prog-id=91 op=LOAD Dec 13 14:50:42.640000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2d32f860 a2=40 a3=7ffc2d32fa40 items=0 ppid=2662 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.640000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:50:42.641000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:50:42.736604 env[1651]: time="2024-12-13T14:50:42.736229741Z" level=info msg="StopPodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\"" Dec 13 14:50:42.756263 (udev-worker)[2628]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:50:42.759834 systemd-networkd[1374]: vxlan.calico: Link UP Dec 13 14:50:42.759845 systemd-networkd[1374]: vxlan.calico: Gained carrier Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit: BPF prog-id=92 op=LOAD Dec 13 14:50:42.896000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9eb877a0 a2=98 a3=ffffffff items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.896000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.896000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.896000 audit: BPF prog-id=93 op=LOAD Dec 13 14:50:42.896000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9eb875b0 a2=74 a3=540051 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.896000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit: BPF prog-id=94 op=LOAD Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9eb875e0 a2=94 a3=2 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9eb874b0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9eb874e0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9eb873f0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9eb87500 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9eb874e0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9eb874d0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9eb87500 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9eb874e0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9eb87500 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9eb874d0 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9eb87540 a2=28 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.897000 audit: BPF prog-id=95 op=LOAD Dec 13 14:50:42.897000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9eb873b0 a2=40 a3=0 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.897000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.898000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff9eb873a0 a2=50 a3=2800 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff9eb873a0 a2=50 a3=2800 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit: BPF prog-id=96 op=LOAD Dec 13 14:50:42.898000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9eb86bc0 a2=94 a3=2 items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.898000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.898000 audit: BPF prog-id=97 op=LOAD Dec 13 14:50:42.898000 audit[2822]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9eb86cc0 a2=94 a3=2d items=0 ppid=2662 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.906000 audit: BPF prog-id=98 op=LOAD Dec 13 14:50:42.906000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3c8734f0 a2=98 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:42.907000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit: BPF prog-id=99 op=LOAD Dec 13 14:50:42.908000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3c8732d0 a2=74 a3=540051 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.908000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:42.908000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:42.908000 audit: BPF prog-id=100 op=LOAD Dec 13 14:50:42.908000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3c873300 a2=94 a3=2 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:42.908000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:42.908000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:50:42.895476 (udev-worker)[2629]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:50:42.985119 kubelet[2042]: I1213 14:50:42.985046 2042 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gcwb6" podStartSLOduration=6.508910564 podStartE2EDuration="28.985020199s" podCreationTimestamp="2024-12-13 14:50:14 +0000 UTC" firstStartedPulling="2024-12-13 14:50:17.601318142 +0000 UTC m=+4.016184447" lastFinishedPulling="2024-12-13 14:50:40.077427762 +0000 UTC m=+26.492294082" observedRunningTime="2024-12-13 14:50:40.857969157 +0000 UTC m=+27.272835479" watchObservedRunningTime="2024-12-13 14:50:42.985020199 +0000 UTC m=+29.399886526" Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.087000 audit: BPF prog-id=101 op=LOAD Dec 13 14:50:43.087000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3c8731c0 a2=40 a3=1 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.087000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.088000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:50:43.088000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.088000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff3c873290 a2=50 a3=7fff3c873370 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.088000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3c8731d0 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3c873200 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3c873110 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3c873220 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3c873200 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3c8731f0 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3c873220 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3c873200 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3c873220 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.104000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.104000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3c8731f0 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.104000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3c873260 a2=28 a3=0 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3c873010 a2=50 a3=1 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit: BPF prog-id=102 op=LOAD Dec 13 14:50:43.105000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff3c873010 a2=94 a3=5 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.105000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3c8730c0 a2=50 a3=1 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff3c8731e0 a2=4 a3=38 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.105000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:43.105000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3c873230 a2=94 a3=6 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.105000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:43.106000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3c8729e0 a2=94 a3=83 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { confidentiality } for pid=2826 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:50:43.106000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3c8729e0 a2=94 a3=83 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.106000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.106000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3c874420 a2=10 a3=f1f00800 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.107000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.107000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3c8742c0 a2=10 a3=3 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.107000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.107000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3c874260 a2=10 a3=3 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.107000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.107000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3c874260 a2=10 a3=7 items=0 ppid=2662 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:50:43.116000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:50:43.116000 audit[1631]: SYSCALL arch=c000003e syscall=47 success=yes exit=236 a0=d a1=7ffc1363a020 a2=40000000 a3=0 items=0 ppid=1 pid=1631 auid=4294967295 uid=201 gid=201 euid=201 suid=201 fsuid=201 egid=201 sgid=201 fsgid=201 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.116000 audit: PROCTITLE proctitle=2F7573722F62696E2F646275732D6461656D6F6E002D2D73797374656D002D2D616464726573733D73797374656D643A002D2D6E6F666F726B002D2D6E6F70696466696C65002D2D73797374656D642D61637469766174696F6E002D2D7379736C6F672D6F6E6C79 Dec 13 14:50:43.240000 audit[2856]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2856 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:43.240000 audit[2856]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd8bfe4870 a2=0 a3=7ffd8bfe485c items=0 ppid=2662 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.240000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:43.265000 audit[2854]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:43.265000 audit[2854]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff168c0620 a2=0 a3=7fff168c060c items=0 ppid=2662 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:43.274000 audit[2855]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:43.274000 audit[2855]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffca1415240 a2=0 a3=7ffca141522c items=0 ppid=2662 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.274000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:42.985 [INFO][2805] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:42.986 [INFO][2805] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" iface="eth0" netns="/var/run/netns/cni-1a926abd-59b6-6310-83e7-5ddfe4e546c0" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:42.986 [INFO][2805] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" iface="eth0" netns="/var/run/netns/cni-1a926abd-59b6-6310-83e7-5ddfe4e546c0" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:42.990 [INFO][2805] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" iface="eth0" netns="/var/run/netns/cni-1a926abd-59b6-6310-83e7-5ddfe4e546c0" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:42.990 [INFO][2805] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:42.990 [INFO][2805] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.250 [INFO][2830] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.250 [INFO][2830] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.251 [INFO][2830] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.263 [WARNING][2830] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.263 [INFO][2830] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.271 [INFO][2830] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:43.278985 env[1651]: 2024-12-13 14:50:43.276 [INFO][2805] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:50:43.278000 audit[2858]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2858 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:43.278000 audit[2858]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdaf8a5d60 a2=0 a3=7ffdaf8a5d4c items=0 ppid=2662 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:43.281239 env[1651]: time="2024-12-13T14:50:43.281181706Z" level=info msg="TearDown network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" successfully" Dec 13 14:50:43.281345 env[1651]: time="2024-12-13T14:50:43.281322906Z" level=info msg="StopPodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" returns successfully" Dec 13 14:50:43.286240 systemd[1]: run-netns-cni\x2d1a926abd\x2d59b6\x2d6310\x2d83e7\x2d5ddfe4e546c0.mount: Deactivated successfully. Dec 13 14:50:43.287227 env[1651]: time="2024-12-13T14:50:43.287187678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sfnz7,Uid:4422aede-0445-4731-b3b0-fa5487010335,Namespace:calico-system,Attempt:1,}" Dec 13 14:50:43.427380 kubelet[2042]: I1213 14:50:43.426522 2042 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:50:43.472087 kubelet[2042]: E1213 14:50:43.472024 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:43.472709 systemd[1]: run-containerd-runc-k8s.io-aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a-runc.1pB3Vo.mount: Deactivated successfully. Dec 13 14:50:43.528195 (udev-worker)[2627]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:50:43.539103 systemd-networkd[1374]: cali3a0bb98b245: Link UP Dec 13 14:50:43.542490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3a0bb98b245: link becomes ready Dec 13 14:50:43.542229 systemd-networkd[1374]: cali3a0bb98b245: Gained carrier Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.362 [INFO][2867] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.144-k8s-csi--node--driver--sfnz7-eth0 csi-node-driver- calico-system 4422aede-0445-4731-b3b0-fa5487010335 1050 0 2024-12-13 14:50:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.26.144 csi-node-driver-sfnz7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3a0bb98b245 [] []}} ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.363 [INFO][2867] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.403 [INFO][2877] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" HandleID="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.419 [INFO][2877] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" HandleID="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fc1c0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.26.144", "pod":"csi-node-driver-sfnz7", "timestamp":"2024-12-13 14:50:43.40374404 +0000 UTC"}, Hostname:"172.31.26.144", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.419 [INFO][2877] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.420 [INFO][2877] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.420 [INFO][2877] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.144' Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.422 [INFO][2877] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.434 [INFO][2877] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.453 [INFO][2877] ipam/ipam.go 489: Trying affinity for 192.168.22.192/26 host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.462 [INFO][2877] ipam/ipam.go 155: Attempting to load block cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.467 [INFO][2877] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.467 [INFO][2877] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.192/26 handle="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.481 [INFO][2877] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.491 [INFO][2877] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.22.192/26 handle="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.507 [INFO][2877] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.22.193/26] block=192.168.22.192/26 handle="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.507 [INFO][2877] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.193/26] handle="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" host="172.31.26.144" Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.507 [INFO][2877] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:43.578195 env[1651]: 2024-12-13 14:50:43.507 [INFO][2877] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.22.193/26] IPv6=[] ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" HandleID="k8s-pod-network.7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.579454 env[1651]: 2024-12-13 14:50:43.510 [INFO][2867] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-csi--node--driver--sfnz7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4422aede-0445-4731-b3b0-fa5487010335", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"", Pod:"csi-node-driver-sfnz7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.22.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a0bb98b245", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:43.579454 env[1651]: 2024-12-13 14:50:43.510 [INFO][2867] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.22.193/32] ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.579454 env[1651]: 2024-12-13 14:50:43.510 [INFO][2867] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3a0bb98b245 ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.579454 env[1651]: 2024-12-13 14:50:43.546 [INFO][2867] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.579454 env[1651]: 2024-12-13 14:50:43.546 [INFO][2867] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-csi--node--driver--sfnz7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4422aede-0445-4731-b3b0-fa5487010335", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce", Pod:"csi-node-driver-sfnz7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.22.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a0bb98b245", MAC:"66:69:ad:11:6b:c2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:43.579454 env[1651]: 2024-12-13 14:50:43.565 [INFO][2867] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce" Namespace="calico-system" Pod="csi-node-driver-sfnz7" WorkloadEndpoint="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:50:43.610000 audit[2926]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:43.610000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffeb5cea080 a2=0 a3=7ffeb5cea06c items=0 ppid=2662 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.610000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:43.618653 env[1651]: time="2024-12-13T14:50:43.618560879Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:43.618653 env[1651]: time="2024-12-13T14:50:43.618604828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:43.619017 env[1651]: time="2024-12-13T14:50:43.618620666Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:43.619017 env[1651]: time="2024-12-13T14:50:43.618796164Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce pid=2927 runtime=io.containerd.runc.v2 Dec 13 14:50:43.650944 systemd[1]: Started cri-containerd-7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce.scope. Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.693000 audit: BPF prog-id=103 op=LOAD Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2927 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393061613832623239373537336438646664643964636532386163 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2927 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393061613832623239373537336438646664643964636532386163 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit: BPF prog-id=104 op=LOAD Dec 13 14:50:43.694000 audit[2944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d2af0 items=0 ppid=2927 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393061613832623239373537336438646664643964636532386163 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit: BPF prog-id=105 op=LOAD Dec 13 14:50:43.694000 audit[2944]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d2b38 items=0 ppid=2927 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393061613832623239373537336438646664643964636532386163 Dec 13 14:50:43.694000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:50:43.694000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { perfmon } for pid=2944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit[2944]: AVC avc: denied { bpf } for pid=2944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:43.694000 audit: BPF prog-id=106 op=LOAD Dec 13 14:50:43.694000 audit[2944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d2f48 items=0 ppid=2927 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:43.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393061613832623239373537336438646664643964636532386163 Dec 13 14:50:43.721640 env[1651]: time="2024-12-13T14:50:43.721593364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sfnz7,Uid:4422aede-0445-4731-b3b0-fa5487010335,Namespace:calico-system,Attempt:1,} returns sandbox id \"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce\"" Dec 13 14:50:43.727220 env[1651]: time="2024-12-13T14:50:43.727178853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:50:44.154134 systemd-networkd[1374]: vxlan.calico: Gained IPv6LL Dec 13 14:50:44.472660 kubelet[2042]: E1213 14:50:44.472386 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:45.458557 systemd-networkd[1374]: cali3a0bb98b245: Gained IPv6LL Dec 13 14:50:45.509498 kubelet[2042]: E1213 14:50:45.509426 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:45.533703 env[1651]: time="2024-12-13T14:50:45.533644937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:45.537128 env[1651]: time="2024-12-13T14:50:45.536445368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:45.540775 env[1651]: time="2024-12-13T14:50:45.540683240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:45.543570 env[1651]: time="2024-12-13T14:50:45.543528816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:45.544318 env[1651]: time="2024-12-13T14:50:45.544272918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:50:45.549161 env[1651]: time="2024-12-13T14:50:45.549117846Z" level=info msg="CreateContainer within sandbox \"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:50:45.575779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3354066274.mount: Deactivated successfully. Dec 13 14:50:45.577966 env[1651]: time="2024-12-13T14:50:45.577459846Z" level=info msg="CreateContainer within sandbox \"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2641004b047c46939b7c9dcaa3e4055cdb03bc9ad6c581f6b215d4af5e1c87a6\"" Dec 13 14:50:45.578514 env[1651]: time="2024-12-13T14:50:45.578483062Z" level=info msg="StartContainer for \"2641004b047c46939b7c9dcaa3e4055cdb03bc9ad6c581f6b215d4af5e1c87a6\"" Dec 13 14:50:45.617469 systemd[1]: Started cri-containerd-2641004b047c46939b7c9dcaa3e4055cdb03bc9ad6c581f6b215d4af5e1c87a6.scope. Dec 13 14:50:45.643000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.646206 kernel: kauditd_printk_skb: 610 callbacks suppressed Dec 13 14:50:45.646383 kernel: audit: type=1400 audit(1734101445.643:699): avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.643000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f555e0ee7b8 items=0 ppid=2927 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:45.655247 kernel: audit: type=1300 audit(1734101445.643:699): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f555e0ee7b8 items=0 ppid=2927 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:45.655424 kernel: audit: type=1327 audit(1734101445.643:699): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343130303462303437633436393339623763396463616133653430 Dec 13 14:50:45.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343130303462303437633436393339623763396463616133653430 Dec 13 14:50:45.665050 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.669209 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.687173 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.687327 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.692372 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.703407 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.703504 kernel: audit: type=1400 audit(1734101445.654:700): avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.654000 audit: BPF prog-id=107 op=LOAD Dec 13 14:50:45.654000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003c0388 items=0 ppid=2927 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:45.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343130303462303437633436393339623763396463616133653430 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit: BPF prog-id=108 op=LOAD Dec 13 14:50:45.661000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003c03d8 items=0 ppid=2927 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343130303462303437633436393339623763396463616133653430 Dec 13 14:50:45.661000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:50:45.661000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:45.661000 audit: BPF prog-id=109 op=LOAD Dec 13 14:50:45.661000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c0468 items=0 ppid=2927 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343130303462303437633436393339623763396463616133653430 Dec 13 14:50:45.710044 env[1651]: time="2024-12-13T14:50:45.709991798Z" level=info msg="StartContainer for \"2641004b047c46939b7c9dcaa3e4055cdb03bc9ad6c581f6b215d4af5e1c87a6\" returns successfully" Dec 13 14:50:45.712319 env[1651]: time="2024-12-13T14:50:45.712290695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:50:46.509921 kubelet[2042]: E1213 14:50:46.509859 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:47.210315 env[1651]: time="2024-12-13T14:50:47.210261914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:47.213475 env[1651]: time="2024-12-13T14:50:47.213369573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:47.215742 env[1651]: time="2024-12-13T14:50:47.215701477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:47.218391 env[1651]: time="2024-12-13T14:50:47.218299720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:47.219002 env[1651]: time="2024-12-13T14:50:47.218966209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:50:47.223132 env[1651]: time="2024-12-13T14:50:47.223094448Z" level=info msg="CreateContainer within sandbox \"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:50:47.246521 env[1651]: time="2024-12-13T14:50:47.246473257Z" level=info msg="CreateContainer within sandbox \"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a758d26870054dbf56c164f54cc47b65bf615e3640667637a524f01cc7690120\"" Dec 13 14:50:47.247975 env[1651]: time="2024-12-13T14:50:47.247943251Z" level=info msg="StartContainer for \"a758d26870054dbf56c164f54cc47b65bf615e3640667637a524f01cc7690120\"" Dec 13 14:50:47.331329 systemd[1]: run-containerd-runc-k8s.io-a758d26870054dbf56c164f54cc47b65bf615e3640667637a524f01cc7690120-runc.TbJGjG.mount: Deactivated successfully. Dec 13 14:50:47.340179 systemd[1]: Started cri-containerd-a758d26870054dbf56c164f54cc47b65bf615e3640667637a524f01cc7690120.scope. Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcfd80a4d58 items=0 ppid=2927 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:47.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353864323638373030353464626635366331363466353463633437 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.369000 audit: BPF prog-id=110 op=LOAD Dec 13 14:50:47.369000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000282218 items=0 ppid=2927 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:47.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353864323638373030353464626635366331363466353463633437 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit: BPF prog-id=111 op=LOAD Dec 13 14:50:47.370000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000282268 items=0 ppid=2927 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:47.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353864323638373030353464626635366331363466353463633437 Dec 13 14:50:47.370000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:50:47.370000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:47.370000 audit: BPF prog-id=112 op=LOAD Dec 13 14:50:47.370000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002822f8 items=0 ppid=2927 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:47.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353864323638373030353464626635366331363466353463633437 Dec 13 14:50:47.394764 env[1651]: time="2024-12-13T14:50:47.391956309Z" level=info msg="StartContainer for \"a758d26870054dbf56c164f54cc47b65bf615e3640667637a524f01cc7690120\" returns successfully" Dec 13 14:50:47.510677 kubelet[2042]: E1213 14:50:47.510403 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:47.691268 kubelet[2042]: I1213 14:50:47.691236 2042 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:50:47.691268 kubelet[2042]: I1213 14:50:47.691267 2042 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:50:48.510922 kubelet[2042]: E1213 14:50:48.510813 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:49.024886 update_engine[1642]: I1213 14:50:49.024806 1642 update_attempter.cc:509] Updating boot flags... Dec 13 14:50:49.511845 kubelet[2042]: E1213 14:50:49.511789 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:49.731773 env[1651]: time="2024-12-13T14:50:49.731286969Z" level=info msg="StopPodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\"" Dec 13 14:50:49.796704 kubelet[2042]: I1213 14:50:49.795894 2042 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-sfnz7" podStartSLOduration=32.301334501 podStartE2EDuration="35.795861534s" podCreationTimestamp="2024-12-13 14:50:14 +0000 UTC" firstStartedPulling="2024-12-13 14:50:43.726205807 +0000 UTC m=+30.141072129" lastFinishedPulling="2024-12-13 14:50:47.220732853 +0000 UTC m=+33.635599162" observedRunningTime="2024-12-13 14:50:47.895119813 +0000 UTC m=+34.309986140" watchObservedRunningTime="2024-12-13 14:50:49.795861534 +0000 UTC m=+36.210727863" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.796 [INFO][3344] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.797 [INFO][3344] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" iface="eth0" netns="/var/run/netns/cni-0c013d1b-338b-de7d-9f66-52d30bccddb7" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.797 [INFO][3344] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" iface="eth0" netns="/var/run/netns/cni-0c013d1b-338b-de7d-9f66-52d30bccddb7" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.798 [INFO][3344] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" iface="eth0" netns="/var/run/netns/cni-0c013d1b-338b-de7d-9f66-52d30bccddb7" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.798 [INFO][3344] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.798 [INFO][3344] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.827 [INFO][3351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.828 [INFO][3351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.828 [INFO][3351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.834 [WARNING][3351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.834 [INFO][3351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.837 [INFO][3351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:49.840237 env[1651]: 2024-12-13 14:50:49.838 [INFO][3344] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:50:49.843205 systemd[1]: run-netns-cni\x2d0c013d1b\x2d338b\x2dde7d\x2d9f66\x2d52d30bccddb7.mount: Deactivated successfully. Dec 13 14:50:49.844834 env[1651]: time="2024-12-13T14:50:49.844176069Z" level=info msg="TearDown network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" successfully" Dec 13 14:50:49.844834 env[1651]: time="2024-12-13T14:50:49.844222055Z" level=info msg="StopPodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" returns successfully" Dec 13 14:50:49.845630 env[1651]: time="2024-12-13T14:50:49.845595699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pv9nl,Uid:fb855efb-f9d4-4f23-877c-29c2a6f70731,Namespace:default,Attempt:1,}" Dec 13 14:50:50.005338 (udev-worker)[3082]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:50:50.007245 systemd-networkd[1374]: cali869096b40af: Link UP Dec 13 14:50:50.023499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:50:50.023708 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali869096b40af: link becomes ready Dec 13 14:50:50.024474 systemd-networkd[1374]: cali869096b40af: Gained carrier Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.915 [INFO][3358] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0 nginx-deployment-8587fbcb89- default fb855efb-f9d4-4f23-877c-29c2a6f70731 1085 0 2024-12-13 14:50:33 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.26.144 nginx-deployment-8587fbcb89-pv9nl eth0 default [] [] [kns.default ksa.default.default] cali869096b40af [] []}} ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.915 [INFO][3358] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.958 [INFO][3370] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" HandleID="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.970 [INFO][3370] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" HandleID="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318c10), Attrs:map[string]string{"namespace":"default", "node":"172.31.26.144", "pod":"nginx-deployment-8587fbcb89-pv9nl", "timestamp":"2024-12-13 14:50:49.957999197 +0000 UTC"}, Hostname:"172.31.26.144", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.970 [INFO][3370] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.970 [INFO][3370] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.970 [INFO][3370] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.144' Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.972 [INFO][3370] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.976 [INFO][3370] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.980 [INFO][3370] ipam/ipam.go 489: Trying affinity for 192.168.22.192/26 host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.982 [INFO][3370] ipam/ipam.go 155: Attempting to load block cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.985 [INFO][3370] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.985 [INFO][3370] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.192/26 handle="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.987 [INFO][3370] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578 Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.993 [INFO][3370] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.22.192/26 handle="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.999 [INFO][3370] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.22.194/26] block=192.168.22.192/26 handle="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:49.999 [INFO][3370] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.194/26] handle="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" host="172.31.26.144" Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:50.000 [INFO][3370] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:50.044731 env[1651]: 2024-12-13 14:50:50.000 [INFO][3370] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.22.194/26] IPv6=[] ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" HandleID="k8s-pod-network.e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.046085 env[1651]: 2024-12-13 14:50:50.001 [INFO][3358] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"fb855efb-f9d4-4f23-877c-29c2a6f70731", ResourceVersion:"1085", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-pv9nl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali869096b40af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:50.046085 env[1651]: 2024-12-13 14:50:50.001 [INFO][3358] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.22.194/32] ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.046085 env[1651]: 2024-12-13 14:50:50.002 [INFO][3358] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali869096b40af ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.046085 env[1651]: 2024-12-13 14:50:50.024 [INFO][3358] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.046085 env[1651]: 2024-12-13 14:50:50.026 [INFO][3358] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"fb855efb-f9d4-4f23-877c-29c2a6f70731", ResourceVersion:"1085", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578", Pod:"nginx-deployment-8587fbcb89-pv9nl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali869096b40af", MAC:"5e:86:58:34:5c:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:50.046085 env[1651]: 2024-12-13 14:50:50.038 [INFO][3358] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578" Namespace="default" Pod="nginx-deployment-8587fbcb89-pv9nl" WorkloadEndpoint="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:50:50.071000 audit[3386]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=3386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:50:50.071000 audit[3386]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff7cdd6670 a2=0 a3=7fff7cdd665c items=0 ppid=2662 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.071000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:50:50.093677 env[1651]: time="2024-12-13T14:50:50.093593084Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:50:50.093895 env[1651]: time="2024-12-13T14:50:50.093635058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:50:50.093895 env[1651]: time="2024-12-13T14:50:50.093650957Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:50:50.093895 env[1651]: time="2024-12-13T14:50:50.093801549Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578 pid=3399 runtime=io.containerd.runc.v2 Dec 13 14:50:50.135567 systemd[1]: Started cri-containerd-e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578.scope. Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.173000 audit: BPF prog-id=113 op=LOAD Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3399 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646132616164376466643463326263666631326330623434393239 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3399 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646132616164376466643463326263666631326330623434393239 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit: BPF prog-id=114 op=LOAD Dec 13 14:50:50.174000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00030eda0 items=0 ppid=3399 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646132616164376466643463326263666631326330623434393239 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.174000 audit: BPF prog-id=115 op=LOAD Dec 13 14:50:50.174000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00030ede8 items=0 ppid=3399 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646132616164376466643463326263666631326330623434393239 Dec 13 14:50:50.175000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:50:50.175000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:50.175000 audit: BPF prog-id=116 op=LOAD Dec 13 14:50:50.175000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00030f1f8 items=0 ppid=3399 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646132616164376466643463326263666631326330623434393239 Dec 13 14:50:50.217670 env[1651]: time="2024-12-13T14:50:50.217496679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-pv9nl,Uid:fb855efb-f9d4-4f23-877c-29c2a6f70731,Namespace:default,Attempt:1,} returns sandbox id \"e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578\"" Dec 13 14:50:50.219887 env[1651]: time="2024-12-13T14:50:50.219709436Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:50:50.512879 kubelet[2042]: E1213 14:50:50.512628 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:50.843324 systemd[1]: run-containerd-runc-k8s.io-e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578-runc.IpVCNn.mount: Deactivated successfully. Dec 13 14:50:51.451691 systemd-networkd[1374]: cali869096b40af: Gained IPv6LL Dec 13 14:50:51.513380 kubelet[2042]: E1213 14:50:51.513295 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:52.514253 kubelet[2042]: E1213 14:50:52.514211 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:53.523252 kubelet[2042]: E1213 14:50:53.523185 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:53.598670 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2103933950.mount: Deactivated successfully. Dec 13 14:50:54.447368 kubelet[2042]: E1213 14:50:54.447306 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:54.523847 kubelet[2042]: E1213 14:50:54.523801 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:55.524395 kubelet[2042]: E1213 14:50:55.524323 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:55.904297 env[1651]: time="2024-12-13T14:50:55.904102790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:55.913088 env[1651]: time="2024-12-13T14:50:55.913038495Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:55.918607 env[1651]: time="2024-12-13T14:50:55.918552554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:55.936662 env[1651]: time="2024-12-13T14:50:55.936597597Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:50:55.937776 env[1651]: time="2024-12-13T14:50:55.937739007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:55.948400 env[1651]: time="2024-12-13T14:50:55.948351558Z" level=info msg="CreateContainer within sandbox \"e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:50:55.975367 env[1651]: time="2024-12-13T14:50:55.973154793Z" level=info msg="CreateContainer within sandbox \"e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b0fe6a5da15ef52681222e704ba7d0e188cebf960017bf090c334a210232f214\"" Dec 13 14:50:55.976423 env[1651]: time="2024-12-13T14:50:55.976318742Z" level=info msg="StartContainer for \"b0fe6a5da15ef52681222e704ba7d0e188cebf960017bf090c334a210232f214\"" Dec 13 14:50:56.049133 systemd[1]: Started cri-containerd-b0fe6a5da15ef52681222e704ba7d0e188cebf960017bf090c334a210232f214.scope. Dec 13 14:50:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.085859 kernel: kauditd_printk_skb: 136 callbacks suppressed Dec 13 14:50:56.086024 kernel: audit: type=1400 audit(1734101456.083:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.093698 kernel: audit: type=1400 audit(1734101456.083:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.093842 kernel: audit: type=1400 audit(1734101456.086:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.101101 kernel: audit: type=1400 audit(1734101456.086:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.106062 kernel: audit: type=1400 audit(1734101456.086:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.115775 kernel: audit: type=1400 audit(1734101456.086:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.115915 kernel: audit: type=1400 audit(1734101456.086:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.125166 kernel: audit: type=1400 audit(1734101456.086:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.125372 kernel: audit: type=1400 audit(1734101456.086:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.129542 kernel: audit: type=1400 audit(1734101456.093:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.093000 audit: BPF prog-id=117 op=LOAD Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3399 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:56.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666536613564613135656635323638313232326537303462613764 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3399 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:56.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666536613564613135656635323638313232326537303462613764 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.094000 audit: BPF prog-id=118 op=LOAD Dec 13 14:50:56.094000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001dd090 items=0 ppid=3399 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:56.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666536613564613135656635323638313232326537303462613764 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.097000 audit: BPF prog-id=119 op=LOAD Dec 13 14:50:56.097000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001dd0d8 items=0 ppid=3399 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:56.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666536613564613135656635323638313232326537303462613764 Dec 13 14:50:56.100000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:50:56.100000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:56.100000 audit: BPF prog-id=120 op=LOAD Dec 13 14:50:56.100000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001dd4e8 items=0 ppid=3399 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:56.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666536613564613135656635323638313232326537303462613764 Dec 13 14:50:56.161033 env[1651]: time="2024-12-13T14:50:56.159184478Z" level=info msg="StartContainer for \"b0fe6a5da15ef52681222e704ba7d0e188cebf960017bf090c334a210232f214\" returns successfully" Dec 13 14:50:56.525483 kubelet[2042]: E1213 14:50:56.525361 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:56.918651 kubelet[2042]: I1213 14:50:56.918593 2042 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-pv9nl" podStartSLOduration=18.199346418 podStartE2EDuration="23.918574613s" podCreationTimestamp="2024-12-13 14:50:33 +0000 UTC" firstStartedPulling="2024-12-13 14:50:50.219286818 +0000 UTC m=+36.634153127" lastFinishedPulling="2024-12-13 14:50:55.938515002 +0000 UTC m=+42.353381322" observedRunningTime="2024-12-13 14:50:56.918236258 +0000 UTC m=+43.333102588" watchObservedRunningTime="2024-12-13 14:50:56.918574613 +0000 UTC m=+43.333440939" Dec 13 14:50:56.969112 systemd[1]: run-containerd-runc-k8s.io-b0fe6a5da15ef52681222e704ba7d0e188cebf960017bf090c334a210232f214-runc.PRAFNf.mount: Deactivated successfully. Dec 13 14:50:57.525903 kubelet[2042]: E1213 14:50:57.525842 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:58.526455 kubelet[2042]: E1213 14:50:58.526415 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:50:59.526939 kubelet[2042]: E1213 14:50:59.526890 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:00.528160 kubelet[2042]: E1213 14:51:00.528106 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:01.528845 kubelet[2042]: E1213 14:51:01.528786 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:02.530012 kubelet[2042]: E1213 14:51:02.529953 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:03.531023 kubelet[2042]: E1213 14:51:03.530968 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:04.531334 kubelet[2042]: E1213 14:51:04.531279 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:05.531538 kubelet[2042]: E1213 14:51:05.531488 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:06.018000 audit[3511]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.021653 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:51:06.021764 kernel: audit: type=1325 audit(1734101466.018:748): table=filter:71 family=2 entries=20 op=nft_register_rule pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.018000 audit[3511]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc46ed4dc0 a2=0 a3=7ffc46ed4dac items=0 ppid=2263 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.045261 kernel: audit: type=1300 audit(1734101466.018:748): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc46ed4dc0 a2=0 a3=7ffc46ed4dac items=0 ppid=2263 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.045412 kernel: audit: type=1327 audit(1734101466.018:748): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.051000 audit[3511]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.051000 audit[3511]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc46ed4dc0 a2=0 a3=0 items=0 ppid=2263 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.056994 kernel: audit: type=1325 audit(1734101466.051:749): table=nat:72 family=2 entries=22 op=nft_register_rule pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.057053 kernel: audit: type=1300 audit(1734101466.051:749): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc46ed4dc0 a2=0 a3=0 items=0 ppid=2263 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.066890 kernel: audit: type=1327 audit(1734101466.051:749): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.079630 systemd[1]: Created slice kubepods-besteffort-podba7dd841_2b47_4b23_a32b_28e38411b337.slice. Dec 13 14:51:06.081000 audit[3515]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.081000 audit[3515]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd910cc5a0 a2=0 a3=7ffd910cc58c items=0 ppid=2263 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.092629 kernel: audit: type=1325 audit(1734101466.081:750): table=filter:73 family=2 entries=32 op=nft_register_rule pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.092770 kernel: audit: type=1300 audit(1734101466.081:750): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd910cc5a0 a2=0 a3=7ffd910cc58c items=0 ppid=2263 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.092818 kernel: audit: type=1327 audit(1734101466.081:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.097000 audit[3515]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.097000 audit[3515]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd910cc5a0 a2=0 a3=0 items=0 ppid=2263 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.101893 kernel: audit: type=1325 audit(1734101466.097:751): table=nat:74 family=2 entries=22 op=nft_register_rule pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.215283 kubelet[2042]: I1213 14:51:06.215233 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ba7dd841-2b47-4b23-a32b-28e38411b337-data\") pod \"nfs-server-provisioner-0\" (UID: \"ba7dd841-2b47-4b23-a32b-28e38411b337\") " pod="default/nfs-server-provisioner-0" Dec 13 14:51:06.215504 kubelet[2042]: I1213 14:51:06.215331 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmrhk\" (UniqueName: \"kubernetes.io/projected/ba7dd841-2b47-4b23-a32b-28e38411b337-kube-api-access-hmrhk\") pod \"nfs-server-provisioner-0\" (UID: \"ba7dd841-2b47-4b23-a32b-28e38411b337\") " pod="default/nfs-server-provisioner-0" Dec 13 14:51:06.386843 env[1651]: time="2024-12-13T14:51:06.386789761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ba7dd841-2b47-4b23-a32b-28e38411b337,Namespace:default,Attempt:0,}" Dec 13 14:51:06.532279 kubelet[2042]: E1213 14:51:06.532224 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:06.545779 (udev-worker)[3513]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:51:06.546729 systemd-networkd[1374]: cali60e51b789ff: Link UP Dec 13 14:51:06.549636 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:51:06.549714 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:51:06.549341 systemd-networkd[1374]: cali60e51b789ff: Gained carrier Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.451 [INFO][3518] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.144-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ba7dd841-2b47-4b23-a32b-28e38411b337 1144 0 2024-12-13 14:51:06 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.26.144 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.451 [INFO][3518] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.487 [INFO][3529] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" HandleID="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Workload="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.500 [INFO][3529] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" HandleID="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Workload="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"default", "node":"172.31.26.144", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:51:06.487723222 +0000 UTC"}, Hostname:"172.31.26.144", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.500 [INFO][3529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.500 [INFO][3529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.500 [INFO][3529] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.144' Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.503 [INFO][3529] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.510 [INFO][3529] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.515 [INFO][3529] ipam/ipam.go 489: Trying affinity for 192.168.22.192/26 host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.517 [INFO][3529] ipam/ipam.go 155: Attempting to load block cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.521 [INFO][3529] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.522 [INFO][3529] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.192/26 handle="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.523 [INFO][3529] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169 Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.531 [INFO][3529] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.22.192/26 handle="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.539 [INFO][3529] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.22.195/26] block=192.168.22.192/26 handle="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.539 [INFO][3529] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.195/26] handle="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" host="172.31.26.144" Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.539 [INFO][3529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:06.578355 env[1651]: 2024-12-13 14:51:06.539 [INFO][3529] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.22.195/26] IPv6=[] ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" HandleID="k8s-pod-network.6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Workload="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.579385 env[1651]: 2024-12-13 14:51:06.542 [INFO][3518] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ba7dd841-2b47-4b23-a32b-28e38411b337", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 51, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.22.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:06.579385 env[1651]: 2024-12-13 14:51:06.542 [INFO][3518] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.22.195/32] ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.579385 env[1651]: 2024-12-13 14:51:06.542 [INFO][3518] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.579385 env[1651]: 2024-12-13 14:51:06.550 [INFO][3518] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.579852 env[1651]: 2024-12-13 14:51:06.550 [INFO][3518] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ba7dd841-2b47-4b23-a32b-28e38411b337", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 51, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.22.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ae:23:62:aa:3a:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:06.579852 env[1651]: 2024-12-13 14:51:06.576 [INFO][3518] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.26.144-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:51:06.601000 audit[3552]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3552 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:51:06.601000 audit[3552]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffce41dbd20 a2=0 a3=7ffce41dbd0c items=0 ppid=2662 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:51:06.605619 env[1651]: time="2024-12-13T14:51:06.605535642Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:51:06.605619 env[1651]: time="2024-12-13T14:51:06.605587603Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:51:06.605832 env[1651]: time="2024-12-13T14:51:06.605605155Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:51:06.606137 env[1651]: time="2024-12-13T14:51:06.606094645Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169 pid=3559 runtime=io.containerd.runc.v2 Dec 13 14:51:06.638067 systemd[1]: Started cri-containerd-6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169.scope. Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit: BPF prog-id=121 op=LOAD Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3559 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666564626264636433303262623331333334313365666533386534 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3559 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666564626264636433303262623331333334313365666533386534 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.657000 audit: BPF prog-id=122 op=LOAD Dec 13 14:51:06.657000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025070 items=0 ppid=3559 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666564626264636433303262623331333334313365666533386534 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit: BPF prog-id=123 op=LOAD Dec 13 14:51:06.658000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000250b8 items=0 ppid=3559 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666564626264636433303262623331333334313365666533386534 Dec 13 14:51:06.658000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:51:06.658000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:06.658000 audit: BPF prog-id=124 op=LOAD Dec 13 14:51:06.658000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000254c8 items=0 ppid=3559 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666564626264636433303262623331333334313365666533386534 Dec 13 14:51:06.693235 env[1651]: time="2024-12-13T14:51:06.692695543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ba7dd841-2b47-4b23-a32b-28e38411b337,Namespace:default,Attempt:0,} returns sandbox id \"6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169\"" Dec 13 14:51:06.695159 env[1651]: time="2024-12-13T14:51:06.695105955Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:51:07.335013 systemd[1]: run-containerd-runc-k8s.io-6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169-runc.uAwB6D.mount: Deactivated successfully. Dec 13 14:51:07.532571 kubelet[2042]: E1213 14:51:07.532526 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:08.346034 systemd-networkd[1374]: cali60e51b789ff: Gained IPv6LL Dec 13 14:51:08.533735 kubelet[2042]: E1213 14:51:08.533666 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:09.534587 kubelet[2042]: E1213 14:51:09.534484 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:10.224593 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3004906312.mount: Deactivated successfully. Dec 13 14:51:10.535249 kubelet[2042]: E1213 14:51:10.534888 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:11.535418 kubelet[2042]: E1213 14:51:11.535350 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:12.536412 kubelet[2042]: E1213 14:51:12.536345 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:13.502438 systemd[1]: run-containerd-runc-k8s.io-aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a-runc.0kLkF6.mount: Deactivated successfully. Dec 13 14:51:13.537539 kubelet[2042]: E1213 14:51:13.537454 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:13.729745 env[1651]: time="2024-12-13T14:51:13.729649519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:13.733064 env[1651]: time="2024-12-13T14:51:13.733024436Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:13.734984 env[1651]: time="2024-12-13T14:51:13.734941020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:13.737660 env[1651]: time="2024-12-13T14:51:13.737622805Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:13.739356 env[1651]: time="2024-12-13T14:51:13.739284809Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:51:13.742941 env[1651]: time="2024-12-13T14:51:13.742906509Z" level=info msg="CreateContainer within sandbox \"6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:51:13.763782 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1192378667.mount: Deactivated successfully. Dec 13 14:51:13.774817 env[1651]: time="2024-12-13T14:51:13.774776907Z" level=info msg="CreateContainer within sandbox \"6dfedbbdcd302bb3133413efe38e4e122b46b082f24badb1f7c7491084b88169\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5576f0ef25aaa16e9a9d67ca7214136a0cc3d53d795ca1139ec28e480b5eab55\"" Dec 13 14:51:13.775635 env[1651]: time="2024-12-13T14:51:13.775610475Z" level=info msg="StartContainer for \"5576f0ef25aaa16e9a9d67ca7214136a0cc3d53d795ca1139ec28e480b5eab55\"" Dec 13 14:51:13.800535 systemd[1]: Started cri-containerd-5576f0ef25aaa16e9a9d67ca7214136a0cc3d53d795ca1139ec28e480b5eab55.scope. Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.829839 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:51:13.830008 kernel: audit: type=1400 audit(1734101473.826:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.839284 kernel: audit: type=1400 audit(1734101473.826:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.843881 kernel: audit: type=1400 audit(1734101473.826:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.844135 kernel: audit: type=1400 audit(1734101473.826:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.850880 kernel: audit: type=1400 audit(1734101473.826:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.851384 kernel: audit: type=1400 audit(1734101473.826:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.858094 kernel: audit: type=1400 audit(1734101473.826:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.858571 kernel: audit: type=1400 audit(1734101473.826:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.872625 kernel: audit: type=1400 audit(1734101473.826:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.872755 kernel: audit: type=1400 audit(1734101473.827:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.827000 audit: BPF prog-id=125 op=LOAD Dec 13 14:51:13.828000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.828000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3559 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:13.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373666306566323561616131366539613964363763613732313431 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3559 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:13.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373666306566323561616131366539613964363763613732313431 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.832000 audit: BPF prog-id=126 op=LOAD Dec 13 14:51:13.832000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00032bd20 items=0 ppid=3559 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:13.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373666306566323561616131366539613964363763613732313431 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.834000 audit: BPF prog-id=127 op=LOAD Dec 13 14:51:13.834000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00032bd68 items=0 ppid=3559 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:13.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373666306566323561616131366539613964363763613732313431 Dec 13 14:51:13.838000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:51:13.838000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:13.838000 audit: BPF prog-id=128 op=LOAD Dec 13 14:51:13.838000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c00039c178 items=0 ppid=3559 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:13.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373666306566323561616131366539613964363763613732313431 Dec 13 14:51:13.888248 env[1651]: time="2024-12-13T14:51:13.888198798Z" level=info msg="StartContainer for \"5576f0ef25aaa16e9a9d67ca7214136a0cc3d53d795ca1139ec28e480b5eab55\" returns successfully" Dec 13 14:51:13.944000 audit[3657]: AVC avc: denied { search } for pid=3657 comm="rpcbind" name="crypto" dev="proc" ino=22936 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:51:13.944000 audit[3657]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f386e1230c0 a2=0 a3=0 items=0 ppid=3638 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 key=(null) Dec 13 14:51:13.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:51:14.002187 kubelet[2042]: I1213 14:51:14.002107 2042 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.955552293 podStartE2EDuration="8.001935197s" podCreationTimestamp="2024-12-13 14:51:06 +0000 UTC" firstStartedPulling="2024-12-13 14:51:06.694662092 +0000 UTC m=+53.109528400" lastFinishedPulling="2024-12-13 14:51:13.74104498 +0000 UTC m=+60.155911304" observedRunningTime="2024-12-13 14:51:14.001904747 +0000 UTC m=+60.416771074" watchObservedRunningTime="2024-12-13 14:51:14.001935197 +0000 UTC m=+60.416801528" Dec 13 14:51:14.000000 audit[3662]: AVC avc: denied { search } for pid=3662 comm="dbus-daemon" name="crypto" dev="proc" ino=22936 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:51:14.000000 audit[3662]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f49aab820c0 a2=0 a3=0 items=0 ppid=3638 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 key=(null) Dec 13 14:51:14.000000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:51:14.009000 audit[3663]: AVC avc: denied { watch } for pid=3663 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538663 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c40,c622 tclass=dir permissive=0 Dec 13 14:51:14.009000 audit[3663]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=561a7d57f040 a2=2c8 a3=7fffd81612dc items=0 ppid=3638 pid=3663 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 key=(null) Dec 13 14:51:14.009000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:51:14.019000 audit[3664]: AVC avc: denied { read } for pid=3664 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:51:14.019000 audit[3664]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2393ffa320 a1=80000 a2=d a3=7fffd308c850 items=0 ppid=3638 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 key=(null) Dec 13 14:51:14.019000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:51:14.022000 audit[3664]: AVC avc: denied { search } for pid=3664 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22936 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:51:14.022000 audit[3664]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f239354e0c0 a2=0 a3=0 items=0 ppid=3638 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c622 key=(null) Dec 13 14:51:14.022000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:51:14.086000 audit[3669]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:14.086000 audit[3669]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe68a377f0 a2=0 a3=7ffe68a377dc items=0 ppid=2263 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:14.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:14.093000 audit[3669]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:14.093000 audit[3669]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe68a377f0 a2=0 a3=7ffe68a377dc items=0 ppid=2263 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:14.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:14.447066 kubelet[2042]: E1213 14:51:14.447003 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:14.538006 kubelet[2042]: E1213 14:51:14.537955 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:14.543953 env[1651]: time="2024-12-13T14:51:14.543911647Z" level=info msg="StopPodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\"" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.633 [WARNING][3683] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-csi--node--driver--sfnz7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4422aede-0445-4731-b3b0-fa5487010335", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce", Pod:"csi-node-driver-sfnz7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.22.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a0bb98b245", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.634 [INFO][3683] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.634 [INFO][3683] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" iface="eth0" netns="" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.634 [INFO][3683] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.634 [INFO][3683] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.683 [INFO][3689] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.683 [INFO][3689] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.683 [INFO][3689] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.698 [WARNING][3689] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.698 [INFO][3689] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.702 [INFO][3689] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:14.705908 env[1651]: 2024-12-13 14:51:14.703 [INFO][3683] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.705908 env[1651]: time="2024-12-13T14:51:14.705154269Z" level=info msg="TearDown network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" successfully" Dec 13 14:51:14.705908 env[1651]: time="2024-12-13T14:51:14.705190362Z" level=info msg="StopPodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" returns successfully" Dec 13 14:51:14.707224 env[1651]: time="2024-12-13T14:51:14.706603004Z" level=info msg="RemovePodSandbox for \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\"" Dec 13 14:51:14.707224 env[1651]: time="2024-12-13T14:51:14.706678109Z" level=info msg="Forcibly stopping sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\"" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.775 [WARNING][3707] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-csi--node--driver--sfnz7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4422aede-0445-4731-b3b0-fa5487010335", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"7a90aa82b297573d8dfdd9dce28acb059c6637ebcddce4e44c0db6b6a7f2d3ce", Pod:"csi-node-driver-sfnz7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.22.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a0bb98b245", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.776 [INFO][3707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.776 [INFO][3707] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" iface="eth0" netns="" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.776 [INFO][3707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.776 [INFO][3707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.810 [INFO][3715] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.810 [INFO][3715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.810 [INFO][3715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.821 [WARNING][3715] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.821 [INFO][3715] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" HandleID="k8s-pod-network.36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Workload="172.31.26.144-k8s-csi--node--driver--sfnz7-eth0" Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.823 [INFO][3715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:14.827564 env[1651]: 2024-12-13 14:51:14.824 [INFO][3707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922" Dec 13 14:51:14.828759 env[1651]: time="2024-12-13T14:51:14.827651247Z" level=info msg="TearDown network for sandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" successfully" Dec 13 14:51:14.831369 env[1651]: time="2024-12-13T14:51:14.831333585Z" level=info msg="RemovePodSandbox \"36802a2c632a607123fdfc5ff0928d6ac54e1487ad8938018ec0b935a0199922\" returns successfully" Dec 13 14:51:14.832142 env[1651]: time="2024-12-13T14:51:14.832094837Z" level=info msg="StopPodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\"" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.943 [WARNING][3733] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"fb855efb-f9d4-4f23-877c-29c2a6f70731", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578", Pod:"nginx-deployment-8587fbcb89-pv9nl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali869096b40af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.943 [INFO][3733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.943 [INFO][3733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" iface="eth0" netns="" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.943 [INFO][3733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.943 [INFO][3733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.974 [INFO][3740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.974 [INFO][3740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.974 [INFO][3740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.981 [WARNING][3740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.981 [INFO][3740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.983 [INFO][3740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:14.986517 env[1651]: 2024-12-13 14:51:14.984 [INFO][3733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:14.988121 env[1651]: time="2024-12-13T14:51:14.988080508Z" level=info msg="TearDown network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" successfully" Dec 13 14:51:14.988356 env[1651]: time="2024-12-13T14:51:14.988328701Z" level=info msg="StopPodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" returns successfully" Dec 13 14:51:14.989898 env[1651]: time="2024-12-13T14:51:14.989842339Z" level=info msg="RemovePodSandbox for \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\"" Dec 13 14:51:14.990034 env[1651]: time="2024-12-13T14:51:14.989972175Z" level=info msg="Forcibly stopping sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\"" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.061 [WARNING][3758] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"fb855efb-f9d4-4f23-877c-29c2a6f70731", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 50, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"e1da2aad7dfd4c2bcff12c0b44929647d71f4e81df1a64cd640e77ae71c62578", Pod:"nginx-deployment-8587fbcb89-pv9nl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali869096b40af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.061 [INFO][3758] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.061 [INFO][3758] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" iface="eth0" netns="" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.061 [INFO][3758] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.061 [INFO][3758] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.110 [INFO][3764] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.110 [INFO][3764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.111 [INFO][3764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.119 [WARNING][3764] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.119 [INFO][3764] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" HandleID="k8s-pod-network.d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Workload="172.31.26.144-k8s-nginx--deployment--8587fbcb89--pv9nl-eth0" Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.126 [INFO][3764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:15.131808 env[1651]: 2024-12-13 14:51:15.128 [INFO][3758] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb" Dec 13 14:51:15.135386 env[1651]: time="2024-12-13T14:51:15.131833168Z" level=info msg="TearDown network for sandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" successfully" Dec 13 14:51:15.145524 env[1651]: time="2024-12-13T14:51:15.145472184Z" level=info msg="RemovePodSandbox \"d06dadf9291f86549b54c37311f72ee4550adcb9775f98857e578732e169b7fb\" returns successfully" Dec 13 14:51:15.538167 kubelet[2042]: E1213 14:51:15.538112 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:16.538903 kubelet[2042]: E1213 14:51:16.538779 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:17.540060 kubelet[2042]: E1213 14:51:17.539883 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:18.540227 kubelet[2042]: E1213 14:51:18.540185 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:19.540701 kubelet[2042]: E1213 14:51:19.540645 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:20.541524 kubelet[2042]: E1213 14:51:20.541474 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:21.542304 kubelet[2042]: E1213 14:51:21.542264 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:22.542493 kubelet[2042]: E1213 14:51:22.542440 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:23.543281 kubelet[2042]: E1213 14:51:23.543232 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:24.544020 kubelet[2042]: E1213 14:51:24.543769 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:25.544564 kubelet[2042]: E1213 14:51:25.544316 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:26.545055 kubelet[2042]: E1213 14:51:26.544948 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:27.545923 kubelet[2042]: E1213 14:51:27.545864 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:28.547018 kubelet[2042]: E1213 14:51:28.546964 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:29.547354 kubelet[2042]: E1213 14:51:29.547303 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:30.547792 kubelet[2042]: E1213 14:51:30.547750 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:31.548685 kubelet[2042]: E1213 14:51:31.548631 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:32.549141 kubelet[2042]: E1213 14:51:32.549101 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:33.550001 kubelet[2042]: E1213 14:51:33.549950 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:34.447381 kubelet[2042]: E1213 14:51:34.447326 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:34.550390 kubelet[2042]: E1213 14:51:34.550347 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:35.551514 kubelet[2042]: E1213 14:51:35.551463 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:36.552486 kubelet[2042]: E1213 14:51:36.552430 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:37.554108 kubelet[2042]: E1213 14:51:37.554049 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:38.388820 systemd[1]: Created slice kubepods-besteffort-pod6cace578_19b2_4a55_8d45_0dab4ae1556d.slice. Dec 13 14:51:38.483822 kubelet[2042]: I1213 14:51:38.483741 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mkkwq\" (UniqueName: \"kubernetes.io/projected/6cace578-19b2-4a55-8d45-0dab4ae1556d-kube-api-access-mkkwq\") pod \"test-pod-1\" (UID: \"6cace578-19b2-4a55-8d45-0dab4ae1556d\") " pod="default/test-pod-1" Dec 13 14:51:38.483822 kubelet[2042]: I1213 14:51:38.483830 2042 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-994fdf94-a410-453e-851b-fdf057184acc\" (UniqueName: \"kubernetes.io/nfs/6cace578-19b2-4a55-8d45-0dab4ae1556d-pvc-994fdf94-a410-453e-851b-fdf057184acc\") pod \"test-pod-1\" (UID: \"6cace578-19b2-4a55-8d45-0dab4ae1556d\") " pod="default/test-pod-1" Dec 13 14:51:38.554933 kubelet[2042]: E1213 14:51:38.554888 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:38.653991 kernel: Failed to create system directory netfs Dec 13 14:51:38.654153 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:51:38.654189 kernel: audit: type=1400 audit(1734101498.639:796): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.654224 kernel: Failed to create system directory netfs Dec 13 14:51:38.654249 kernel: audit: type=1400 audit(1734101498.639:796): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.654275 kernel: Failed to create system directory netfs Dec 13 14:51:38.654300 kernel: audit: type=1400 audit(1734101498.639:796): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.654325 kernel: Failed to create system directory netfs Dec 13 14:51:38.639000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.639000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.639000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.662394 kernel: audit: type=1400 audit(1734101498.639:796): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.639000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.639000 audit[3799]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b53b56e5e0 a1=153bc a2=55b4fc79e2b0 a3=5 items=0 ppid=471 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:38.677912 kernel: audit: type=1300 audit(1734101498.639:796): arch=c000003e syscall=175 success=yes exit=0 a0=55b53b56e5e0 a1=153bc a2=55b4fc79e2b0 a3=5 items=0 ppid=471 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:38.678262 kernel: audit: type=1327 audit(1734101498.639:796): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:38.639000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:38.697688 kernel: Failed to create system directory fscache Dec 13 14:51:38.697828 kernel: audit: type=1400 audit(1734101498.680:797): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.697888 kernel: Failed to create system directory fscache Dec 13 14:51:38.697917 kernel: audit: type=1400 audit(1734101498.680:797): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.697941 kernel: Failed to create system directory fscache Dec 13 14:51:38.697969 kernel: audit: type=1400 audit(1734101498.680:797): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.707166 kernel: Failed to create system directory fscache Dec 13 14:51:38.707292 kernel: audit: type=1400 audit(1734101498.680:797): avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.707322 kernel: Failed to create system directory fscache Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.709723 kernel: Failed to create system directory fscache Dec 13 14:51:38.709792 kernel: Failed to create system directory fscache Dec 13 14:51:38.709821 kernel: Failed to create system directory fscache Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.711546 kernel: Failed to create system directory fscache Dec 13 14:51:38.711603 kernel: Failed to create system directory fscache Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.713802 kernel: Failed to create system directory fscache Dec 13 14:51:38.713851 kernel: Failed to create system directory fscache Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.714939 kernel: Failed to create system directory fscache Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.680000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.717064 kernel: Failed to create system directory fscache Dec 13 14:51:38.680000 audit[3799]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b53b7839c0 a1=4c0fc a2=55b4fc79e2b0 a3=5 items=0 ppid=471 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:38.680000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:38.719881 kernel: FS-Cache: Loaded Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.770657 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.770749 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.770779 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.770808 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.772334 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.772382 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.773961 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.774100 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.776054 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.776126 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.778574 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.778616 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.778640 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.780421 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.780616 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.782105 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.782147 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.784910 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.784988 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.785019 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.786450 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.786508 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.788626 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.788690 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.790541 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.790604 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.792308 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.792374 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.794015 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.794219 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.796493 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.796591 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.798346 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.798389 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.799998 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.800114 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.802522 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.802595 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.804441 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.804506 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.806338 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.806382 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.808599 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.808659 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.810259 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.811315 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.811385 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.813240 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.813308 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.815575 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.815617 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.815641 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.817237 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.817284 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.818947 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.819006 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.820575 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.820630 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.822310 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.822359 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.823956 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.824005 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.826126 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.826196 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.828526 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.828578 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.828603 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.830038 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.830077 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.832561 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.832607 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.832632 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.834252 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.834314 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.836004 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.836059 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.837510 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.837548 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.839747 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.839829 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.840998 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.843025 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.843092 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.845651 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.845707 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.845747 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.847363 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.847411 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.849130 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.849175 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.850969 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.851035 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.852501 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.852540 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.854264 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.854307 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.855912 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.855970 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.857778 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.857921 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.858893 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.860686 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.860763 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.862801 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.862973 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.864668 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.864745 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.866236 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.866381 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.868847 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.868990 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.869024 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.870590 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.870635 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.872560 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.872611 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.874504 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.874560 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.876215 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.876302 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.877978 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.878023 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.879666 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.879711 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.881368 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.881415 kernel: Failed to create system directory sunrpc Dec 13 14:51:38.749000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.893338 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:51:38.893460 kernel: RPC: Registered udp transport module. Dec 13 14:51:38.893488 kernel: RPC: Registered tcp transport module. Dec 13 14:51:38.894231 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:51:38.749000 audit[3799]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b53b7cfad0 a1=1a7f1c a2=55b4fc79e2b0 a3=5 items=6 ppid=471 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:38.749000 audit: CWD cwd="/" Dec 13 14:51:38.749000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:38.749000 audit: PATH item=1 name=(null) inode=23272 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:38.749000 audit: PATH item=2 name=(null) inode=23272 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:38.749000 audit: PATH item=3 name=(null) inode=23273 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:38.749000 audit: PATH item=4 name=(null) inode=23272 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:38.749000 audit: PATH item=5 name=(null) inode=23274 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:51:38.749000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.953125 kernel: Failed to create system directory nfs Dec 13 14:51:38.953251 kernel: Failed to create system directory nfs Dec 13 14:51:38.953281 kernel: Failed to create system directory nfs Dec 13 14:51:38.953306 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.963207 kernel: Failed to create system directory nfs Dec 13 14:51:38.963562 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.965603 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.966481 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.967493 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.968740 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.969952 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.970986 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.971906 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.973436 kernel: Failed to create system directory nfs Dec 13 14:51:38.973487 kernel: Failed to create system directory nfs Dec 13 14:51:38.973514 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.975296 kernel: Failed to create system directory nfs Dec 13 14:51:38.975347 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.978465 kernel: Failed to create system directory nfs Dec 13 14:51:38.978500 kernel: Failed to create system directory nfs Dec 13 14:51:38.978536 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.980257 kernel: Failed to create system directory nfs Dec 13 14:51:38.980323 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.982488 kernel: Failed to create system directory nfs Dec 13 14:51:38.982540 kernel: Failed to create system directory nfs Dec 13 14:51:38.982564 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.984619 kernel: Failed to create system directory nfs Dec 13 14:51:38.984691 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.985403 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.986282 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.988261 kernel: Failed to create system directory nfs Dec 13 14:51:38.988319 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.990123 kernel: Failed to create system directory nfs Dec 13 14:51:38.990198 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.990966 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.992443 kernel: Failed to create system directory nfs Dec 13 14:51:38.992478 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.994129 kernel: Failed to create system directory nfs Dec 13 14:51:38.994179 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.995002 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.995931 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.997768 kernel: Failed to create system directory nfs Dec 13 14:51:38.997839 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.999461 kernel: Failed to create system directory nfs Dec 13 14:51:38.999502 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.001026 kernel: Failed to create system directory nfs Dec 13 14:51:39.001065 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.002452 kernel: Failed to create system directory nfs Dec 13 14:51:39.002505 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.004410 kernel: Failed to create system directory nfs Dec 13 14:51:39.004455 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.006206 kernel: Failed to create system directory nfs Dec 13 14:51:39.006250 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.008491 kernel: Failed to create system directory nfs Dec 13 14:51:39.008535 kernel: Failed to create system directory nfs Dec 13 14:51:39.008568 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.009957 kernel: Failed to create system directory nfs Dec 13 14:51:39.009999 kernel: Failed to create system directory nfs Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:38.932000 audit[3799]: AVC avc: denied { confidentiality } for pid=3799 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.012615 kernel: Failed to create system directory nfs Dec 13 14:51:39.012731 kernel: Failed to create system directory nfs Dec 13 14:51:39.038109 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:51:38.932000 audit[3799]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b53b9f0700 a1=16e97c a2=55b4fc79e2b0 a3=5 items=0 ppid=471 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:38.932000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.097052 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.097199 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.097235 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.099020 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.099091 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.100585 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.100650 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.102229 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.102271 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.104551 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.104606 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.104632 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.106031 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.106083 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.108637 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.108691 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.108729 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.110087 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.110152 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.111665 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.111727 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.113146 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.113198 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.114587 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.114637 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.116080 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.116140 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.117734 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.117786 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.119278 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.119336 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.121583 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.121644 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.121669 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.123803 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.123907 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.126791 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.126928 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.126961 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.128365 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.128427 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.130550 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.130603 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.130638 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.132362 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.132430 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.134620 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.134680 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.134707 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.136167 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.136239 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.138446 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.138500 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.138534 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.140778 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.140838 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.140881 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.142335 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.142391 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.144598 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.144655 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.144681 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.146118 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.146190 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.148301 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.148363 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.150528 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.150566 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.150606 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.152075 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.152134 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.152942 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.154531 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.154584 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.156155 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.156213 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.158395 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.158442 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.160117 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.160154 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.160974 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.163033 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.163125 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.164967 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.165115 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.166642 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.166710 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.168320 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.168395 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.170011 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.172107 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.172156 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.075000 audit[3804]: AVC avc: denied { confidentiality } for pid=3804 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.174457 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.174560 kernel: Failed to create system directory nfs4 Dec 13 14:51:39.356106 kernel: NFS: Registering the id_resolver key type Dec 13 14:51:39.356247 kernel: Key type id_resolver registered Dec 13 14:51:39.356286 kernel: Key type id_legacy registered Dec 13 14:51:39.075000 audit[3804]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc4838ce010 a1=208de4 a2=5600ed40f2b0 a3=5 items=0 ppid=471 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.075000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.376000 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.376776 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.379290 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.379354 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.381445 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.381546 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.383294 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.383369 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.384174 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.384938 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.386588 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.386635 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.388826 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.388898 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.390508 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.390552 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.392492 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.392547 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.394148 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.394205 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.395948 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.396006 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.397660 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.397714 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.400042 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.400134 kernel: Failed to create system directory rpcgss Dec 13 14:51:39.368000 audit[3805]: AVC avc: denied { confidentiality } for pid=3805 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:51:39.368000 audit[3805]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8a8f953010 a1=70af4 a2=565510f562b0 a3=5 items=0 ppid=471 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.368000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:51:39.431113 nfsidmap[3813]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:51:39.435313 nfsidmap[3814]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:51:39.444000 audit[1860]: AVC avc: denied { watch_reads } for pid=1860 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:39.444000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=564569867c70 a2=10 a3=13bea2b3ab8aaf7a items=0 ppid=1 pid=1860 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.444000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:51:39.444000 audit[1860]: AVC avc: denied { watch_reads } for pid=1860 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:39.444000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=564569867c70 a2=10 a3=13bea2b3ab8aaf7a items=0 ppid=1 pid=1860 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.444000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:51:39.444000 audit[1860]: AVC avc: denied { watch_reads } for pid=1860 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:39.444000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=564569867c70 a2=10 a3=13bea2b3ab8aaf7a items=0 ppid=1 pid=1860 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.444000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:51:39.445000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:39.445000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:39.445000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:51:39.555072 kubelet[2042]: E1213 14:51:39.555027 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:39.592173 env[1651]: time="2024-12-13T14:51:39.592122171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6cace578-19b2-4a55-8d45-0dab4ae1556d,Namespace:default,Attempt:0,}" Dec 13 14:51:39.748939 (udev-worker)[3800]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:51:39.753437 systemd-networkd[1374]: cali5ec59c6bf6e: Link UP Dec 13 14:51:39.757512 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:51:39.757754 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:51:39.757462 systemd-networkd[1374]: cali5ec59c6bf6e: Gained carrier Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.650 [INFO][3820] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.26.144-k8s-test--pod--1-eth0 default 6cace578-19b2-4a55-8d45-0dab4ae1556d 1253 0 2024-12-13 14:51:07 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.26.144 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.650 [INFO][3820] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.695 [INFO][3831] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" HandleID="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Workload="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.709 [INFO][3831] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" HandleID="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Workload="172.31.26.144-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031aad0), Attrs:map[string]string{"namespace":"default", "node":"172.31.26.144", "pod":"test-pod-1", "timestamp":"2024-12-13 14:51:39.695350278 +0000 UTC"}, Hostname:"172.31.26.144", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.709 [INFO][3831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.709 [INFO][3831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.709 [INFO][3831] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.26.144' Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.712 [INFO][3831] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.715 [INFO][3831] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.720 [INFO][3831] ipam/ipam.go 489: Trying affinity for 192.168.22.192/26 host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.724 [INFO][3831] ipam/ipam.go 155: Attempting to load block cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.727 [INFO][3831] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.192/26 host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.727 [INFO][3831] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.192/26 handle="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.728 [INFO][3831] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.734 [INFO][3831] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.22.192/26 handle="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.743 [INFO][3831] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.22.196/26] block=192.168.22.192/26 handle="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.743 [INFO][3831] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.196/26] handle="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" host="172.31.26.144" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.744 [INFO][3831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.744 [INFO][3831] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.22.196/26] IPv6=[] ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" HandleID="k8s-pod-network.8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Workload="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.770967 env[1651]: 2024-12-13 14:51:39.746 [INFO][3820] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6cace578-19b2-4a55-8d45-0dab4ae1556d", ResourceVersion:"1253", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 51, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:39.772968 env[1651]: 2024-12-13 14:51:39.746 [INFO][3820] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.22.196/32] ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.772968 env[1651]: 2024-12-13 14:51:39.746 [INFO][3820] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.772968 env[1651]: 2024-12-13 14:51:39.758 [INFO][3820] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.772968 env[1651]: 2024-12-13 14:51:39.759 [INFO][3820] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.26.144-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6cace578-19b2-4a55-8d45-0dab4ae1556d", ResourceVersion:"1253", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 51, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.26.144", ContainerID:"8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:4f:d7:43:3c:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:51:39.772968 env[1651]: 2024-12-13 14:51:39.769 [INFO][3820] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.26.144-k8s-test--pod--1-eth0" Dec 13 14:51:39.793000 audit[3856]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3856 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:51:39.793000 audit[3856]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff273cfd80 a2=0 a3=7fff273cfd6c items=0 ppid=2662 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:51:39.797461 env[1651]: time="2024-12-13T14:51:39.797383440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:51:39.797461 env[1651]: time="2024-12-13T14:51:39.797423434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:51:39.797461 env[1651]: time="2024-12-13T14:51:39.797441946Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:51:39.797974 env[1651]: time="2024-12-13T14:51:39.797843053Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f pid=3859 runtime=io.containerd.runc.v2 Dec 13 14:51:39.840912 systemd[1]: Started cri-containerd-8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f.scope. Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.868000 audit: BPF prog-id=129 op=LOAD Dec 13 14:51:39.869000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.869000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633334616236383061306335363832666632326565626538313433 Dec 13 14:51:39.870000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.870000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633334616236383061306335363832666632326565626538313433 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.871000 audit: BPF prog-id=130 op=LOAD Dec 13 14:51:39.871000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003dc1c0 items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633334616236383061306335363832666632326565626538313433 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.880000 audit: BPF prog-id=131 op=LOAD Dec 13 14:51:39.880000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003dc208 items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633334616236383061306335363832666632326565626538313433 Dec 13 14:51:39.883000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:51:39.884000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:39.884000 audit: BPF prog-id=132 op=LOAD Dec 13 14:51:39.884000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003dc618 items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:39.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633334616236383061306335363832666632326565626538313433 Dec 13 14:51:39.927770 env[1651]: time="2024-12-13T14:51:39.927307676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6cace578-19b2-4a55-8d45-0dab4ae1556d,Namespace:default,Attempt:0,} returns sandbox id \"8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f\"" Dec 13 14:51:39.935452 env[1651]: time="2024-12-13T14:51:39.935418251Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:51:40.262619 env[1651]: time="2024-12-13T14:51:40.262572763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:40.265270 env[1651]: time="2024-12-13T14:51:40.264859129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:40.269553 env[1651]: time="2024-12-13T14:51:40.269513099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:40.271921 env[1651]: time="2024-12-13T14:51:40.271885343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:51:40.273116 env[1651]: time="2024-12-13T14:51:40.273078750Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:51:40.277740 env[1651]: time="2024-12-13T14:51:40.277469078Z" level=info msg="CreateContainer within sandbox \"8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:51:40.306740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4187674565.mount: Deactivated successfully. Dec 13 14:51:40.312093 env[1651]: time="2024-12-13T14:51:40.312047042Z" level=info msg="CreateContainer within sandbox \"8cc34ab680a0c5682ff22eebe814380180548b144d7625a3ba4956c2d4bd376f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"25ca107a145ad1db564f3ac1f72f7cfccfde0766e911fc0f5138c202f2740099\"" Dec 13 14:51:40.313148 env[1651]: time="2024-12-13T14:51:40.313075121Z" level=info msg="StartContainer for \"25ca107a145ad1db564f3ac1f72f7cfccfde0766e911fc0f5138c202f2740099\"" Dec 13 14:51:40.350020 systemd[1]: Started cri-containerd-25ca107a145ad1db564f3ac1f72f7cfccfde0766e911fc0f5138c202f2740099.scope. Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.365000 audit: BPF prog-id=133 op=LOAD Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3859 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235636131303761313435616431646235363466336163316637326637 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3859 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235636131303761313435616431646235363466336163316637326637 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit: BPF prog-id=134 op=LOAD Dec 13 14:51:40.366000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f1330 items=0 ppid=3859 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235636131303761313435616431646235363466336163316637326637 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit: BPF prog-id=135 op=LOAD Dec 13 14:51:40.366000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002f1378 items=0 ppid=3859 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235636131303761313435616431646235363466336163316637326637 Dec 13 14:51:40.366000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:51:40.366000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:51:40.366000 audit: BPF prog-id=136 op=LOAD Dec 13 14:51:40.366000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002f1788 items=0 ppid=3859 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235636131303761313435616431646235363466336163316637326637 Dec 13 14:51:40.403578 env[1651]: time="2024-12-13T14:51:40.403528877Z" level=info msg="StartContainer for \"25ca107a145ad1db564f3ac1f72f7cfccfde0766e911fc0f5138c202f2740099\" returns successfully" Dec 13 14:51:40.555536 kubelet[2042]: E1213 14:51:40.555237 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:40.922659 systemd-networkd[1374]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:51:41.555474 kubelet[2042]: E1213 14:51:41.555424 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:42.555947 kubelet[2042]: E1213 14:51:42.555905 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:43.456349 systemd[1]: run-containerd-runc-k8s.io-aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a-runc.2FEPRb.mount: Deactivated successfully. Dec 13 14:51:43.556893 kubelet[2042]: E1213 14:51:43.556848 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:44.557046 kubelet[2042]: E1213 14:51:44.557007 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:45.558180 kubelet[2042]: E1213 14:51:45.558126 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:46.558534 kubelet[2042]: E1213 14:51:46.558478 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:47.558665 kubelet[2042]: E1213 14:51:47.558594 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:48.559100 kubelet[2042]: E1213 14:51:48.559060 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:49.559490 kubelet[2042]: E1213 14:51:49.559452 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:50.559726 kubelet[2042]: E1213 14:51:50.559594 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:51.560275 kubelet[2042]: E1213 14:51:51.560224 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:52.560999 kubelet[2042]: E1213 14:51:52.560945 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:53.561706 kubelet[2042]: E1213 14:51:53.561653 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:54.447525 kubelet[2042]: E1213 14:51:54.447481 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:54.562550 kubelet[2042]: E1213 14:51:54.562499 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:55.563487 kubelet[2042]: E1213 14:51:55.563430 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:56.564050 kubelet[2042]: E1213 14:51:56.564009 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:57.564607 kubelet[2042]: E1213 14:51:57.564558 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:58.565650 kubelet[2042]: E1213 14:51:58.565599 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:51:59.566233 kubelet[2042]: E1213 14:51:59.566173 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:00.566557 kubelet[2042]: E1213 14:52:00.566505 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:01.567192 kubelet[2042]: E1213 14:52:01.567144 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:02.567989 kubelet[2042]: E1213 14:52:02.567939 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:03.568132 kubelet[2042]: E1213 14:52:03.568074 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:04.568987 kubelet[2042]: E1213 14:52:04.568934 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:05.569759 kubelet[2042]: E1213 14:52:05.569712 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:06.570454 kubelet[2042]: E1213 14:52:06.570398 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:07.114571 kubelet[2042]: E1213 14:52:07.114527 2042 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:52:07.571011 kubelet[2042]: E1213 14:52:07.570970 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:08.571540 kubelet[2042]: E1213 14:52:08.571486 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:09.572190 kubelet[2042]: E1213 14:52:09.572137 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:10.572633 kubelet[2042]: E1213 14:52:10.572591 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:11.573597 kubelet[2042]: E1213 14:52:11.573545 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:12.574008 kubelet[2042]: E1213 14:52:12.573950 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:13.480658 systemd[1]: run-containerd-runc-k8s.io-aa769575159121d5e49fda182876ef00147a12bc644a57ad62134a34166d014a-runc.YLUV7r.mount: Deactivated successfully. Dec 13 14:52:13.574819 kubelet[2042]: E1213 14:52:13.574783 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:14.447801 kubelet[2042]: E1213 14:52:14.447753 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:14.575682 kubelet[2042]: E1213 14:52:14.575644 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:15.576159 kubelet[2042]: E1213 14:52:15.576118 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:16.577090 kubelet[2042]: E1213 14:52:16.577038 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:17.115493 kubelet[2042]: E1213 14:52:17.115440 2042 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:52:17.577966 kubelet[2042]: E1213 14:52:17.577925 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:18.578157 kubelet[2042]: E1213 14:52:18.578109 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:19.579181 kubelet[2042]: E1213 14:52:19.579131 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:20.580337 kubelet[2042]: E1213 14:52:20.580283 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:21.581216 kubelet[2042]: E1213 14:52:21.581162 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:22.582022 kubelet[2042]: E1213 14:52:22.581973 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:23.583138 kubelet[2042]: E1213 14:52:23.583077 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:24.584287 kubelet[2042]: E1213 14:52:24.584212 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:25.584886 kubelet[2042]: E1213 14:52:25.584827 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:26.585203 kubelet[2042]: E1213 14:52:26.585150 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:27.116806 kubelet[2042]: E1213 14:52:27.116731 2042 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:52:27.585800 kubelet[2042]: E1213 14:52:27.585747 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:28.586641 kubelet[2042]: E1213 14:52:28.586591 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:29.587243 kubelet[2042]: E1213 14:52:29.587188 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:30.587982 kubelet[2042]: E1213 14:52:30.587930 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:31.589135 kubelet[2042]: E1213 14:52:31.589078 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:32.589449 kubelet[2042]: E1213 14:52:32.589391 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:33.590186 kubelet[2042]: E1213 14:52:33.590134 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:34.447603 kubelet[2042]: E1213 14:52:34.447548 2042 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:34.591121 kubelet[2042]: E1213 14:52:34.591064 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:35.591998 kubelet[2042]: E1213 14:52:35.591944 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:36.592481 kubelet[2042]: E1213 14:52:36.592422 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:36.595721 kubelet[2042]: E1213 14:52:36.595669 2042 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": unexpected EOF" Dec 13 14:52:36.596337 kubelet[2042]: E1213 14:52:36.596306 2042 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" Dec 13 14:52:36.596507 kubelet[2042]: I1213 14:52:36.596479 2042 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Dec 13 14:52:36.597526 kubelet[2042]: E1213 14:52:36.597209 2042 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="200ms" Dec 13 14:52:36.798475 kubelet[2042]: E1213 14:52:36.798423 2042 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="400ms" Dec 13 14:52:37.199665 kubelet[2042]: E1213 14:52:37.199618 2042 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.26.144?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="800ms" Dec 13 14:52:37.592580 kubelet[2042]: E1213 14:52:37.592514 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:38.593203 kubelet[2042]: E1213 14:52:38.593145 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:39.593623 kubelet[2042]: E1213 14:52:39.593574 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:40.594438 kubelet[2042]: E1213 14:52:40.594384 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:52:41.595003 kubelet[2042]: E1213 14:52:41.594950 2042 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"