Dec 13 14:14:57.935249 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Dec 13 14:14:57.935285 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:14:57.935308 kernel: efi: EFI v2.70 by EDK II Dec 13 14:14:57.935323 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Dec 13 14:14:57.935356 kernel: ACPI: Early table checksum verification disabled Dec 13 14:14:57.935374 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Dec 13 14:14:57.935407 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Dec 13 14:14:57.935422 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:14:57.935437 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Dec 13 14:14:57.935451 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:14:57.935470 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Dec 13 14:14:57.935484 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Dec 13 14:14:57.935498 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Dec 13 14:14:57.935512 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:14:57.935528 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Dec 13 14:14:57.935547 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Dec 13 14:14:57.935562 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Dec 13 14:14:57.935576 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Dec 13 14:14:57.935591 kernel: printk: bootconsole [uart0] enabled Dec 13 14:14:57.935605 kernel: NUMA: Failed to initialise from firmware Dec 13 14:14:57.935620 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:14:57.935635 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Dec 13 14:14:57.935650 kernel: Zone ranges: Dec 13 14:14:57.935665 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Dec 13 14:14:57.935679 kernel: DMA32 empty Dec 13 14:14:57.935693 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Dec 13 14:14:57.935712 kernel: Movable zone start for each node Dec 13 14:14:57.935726 kernel: Early memory node ranges Dec 13 14:14:57.935741 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Dec 13 14:14:57.935755 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Dec 13 14:14:57.935770 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Dec 13 14:14:57.935784 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Dec 13 14:14:57.935798 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Dec 13 14:14:57.935813 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Dec 13 14:14:57.935827 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Dec 13 14:14:57.935841 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Dec 13 14:14:57.935856 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:14:57.935870 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Dec 13 14:14:57.935888 kernel: psci: probing for conduit method from ACPI. Dec 13 14:14:57.935903 kernel: psci: PSCIv1.0 detected in firmware. Dec 13 14:14:57.935924 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:14:57.935940 kernel: psci: Trusted OS migration not required Dec 13 14:14:57.935955 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:14:57.935974 kernel: ACPI: SRAT not present Dec 13 14:14:57.935990 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:14:57.936005 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:14:57.936021 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:14:57.936036 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:14:57.936051 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:14:57.936067 kernel: CPU features: detected: Spectre-v2 Dec 13 14:14:57.936082 kernel: CPU features: detected: Spectre-v3a Dec 13 14:14:57.936097 kernel: CPU features: detected: Spectre-BHB Dec 13 14:14:57.936112 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:14:57.936127 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:14:57.936146 kernel: CPU features: detected: ARM erratum 1742098 Dec 13 14:14:57.936162 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Dec 13 14:14:57.936177 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Dec 13 14:14:57.936192 kernel: Policy zone: Normal Dec 13 14:14:57.936210 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:14:57.936226 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:14:57.936241 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:14:57.936257 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:14:57.936272 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:14:57.936287 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Dec 13 14:14:57.936307 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Dec 13 14:14:57.936323 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:14:57.936371 kernel: trace event string verifier disabled Dec 13 14:14:57.936389 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:14:57.936405 kernel: rcu: RCU event tracing is enabled. Dec 13 14:14:57.936421 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:14:57.936436 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:14:57.936452 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:14:57.936467 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:14:57.936483 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:14:57.936498 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:14:57.936513 kernel: GICv3: 96 SPIs implemented Dec 13 14:14:57.936533 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:14:57.936548 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:14:57.936563 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:14:57.936578 kernel: GICv3: 16 PPIs implemented Dec 13 14:14:57.936593 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Dec 13 14:14:57.936608 kernel: ACPI: SRAT not present Dec 13 14:14:57.936623 kernel: ITS [mem 0x10080000-0x1009ffff] Dec 13 14:14:57.936638 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:14:57.936654 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:14:57.936669 kernel: GICv3: using LPI property table @0x00000004000b0000 Dec 13 14:14:57.936684 kernel: ITS: Using hypervisor restricted LPI range [128] Dec 13 14:14:57.936703 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Dec 13 14:14:57.936718 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Dec 13 14:14:57.936734 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Dec 13 14:14:57.936749 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Dec 13 14:14:57.936765 kernel: Console: colour dummy device 80x25 Dec 13 14:14:57.936780 kernel: printk: console [tty1] enabled Dec 13 14:14:57.936796 kernel: ACPI: Core revision 20210730 Dec 13 14:14:57.936812 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Dec 13 14:14:57.936827 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:14:57.936843 kernel: LSM: Security Framework initializing Dec 13 14:14:57.936862 kernel: SELinux: Initializing. Dec 13 14:14:57.936878 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:14:57.936894 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:14:57.936909 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:14:57.936925 kernel: Platform MSI: ITS@0x10080000 domain created Dec 13 14:14:57.936940 kernel: PCI/MSI: ITS@0x10080000 domain created Dec 13 14:14:57.936956 kernel: Remapping and enabling EFI services. Dec 13 14:14:57.936971 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:14:57.936987 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:14:57.937002 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Dec 13 14:14:57.937040 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Dec 13 14:14:57.937058 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Dec 13 14:14:57.937074 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:14:57.937089 kernel: SMP: Total of 2 processors activated. Dec 13 14:14:57.937105 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:14:57.937121 kernel: CPU features: detected: 32-bit EL1 Support Dec 13 14:14:57.937136 kernel: CPU features: detected: CRC32 instructions Dec 13 14:14:57.937152 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:14:57.937167 kernel: alternatives: patching kernel code Dec 13 14:14:57.937187 kernel: devtmpfs: initialized Dec 13 14:14:57.937203 kernel: KASLR disabled due to lack of seed Dec 13 14:14:57.937229 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:14:57.937249 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:14:57.937265 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:14:57.937281 kernel: SMBIOS 3.0.0 present. Dec 13 14:14:57.937297 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Dec 13 14:14:57.937313 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:14:57.937330 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:14:57.937375 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:14:57.937402 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:14:57.937427 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:14:57.937444 kernel: audit: type=2000 audit(0.247:1): state=initialized audit_enabled=0 res=1 Dec 13 14:14:57.937460 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:14:57.937477 kernel: cpuidle: using governor menu Dec 13 14:14:57.937493 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:14:57.937513 kernel: ASID allocator initialised with 32768 entries Dec 13 14:14:57.937529 kernel: ACPI: bus type PCI registered Dec 13 14:14:57.937545 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:14:57.937561 kernel: Serial: AMBA PL011 UART driver Dec 13 14:14:57.937578 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:14:57.937594 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:14:57.937610 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:14:57.937626 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:14:57.937642 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:14:57.937662 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:14:57.937679 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:14:57.937695 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:14:57.937711 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:14:57.937727 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:14:57.937743 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:14:57.937759 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:14:57.937775 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:14:57.937791 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:14:57.937811 kernel: ACPI: Interpreter enabled Dec 13 14:14:57.937827 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:14:57.937843 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:14:57.937859 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Dec 13 14:14:57.938151 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:14:57.945502 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:14:57.945719 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:14:57.945907 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Dec 13 14:14:57.946102 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Dec 13 14:14:57.946124 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Dec 13 14:14:57.946144 kernel: acpiphp: Slot [1] registered Dec 13 14:14:57.946162 kernel: acpiphp: Slot [2] registered Dec 13 14:14:57.946178 kernel: acpiphp: Slot [3] registered Dec 13 14:14:57.946196 kernel: acpiphp: Slot [4] registered Dec 13 14:14:57.946213 kernel: acpiphp: Slot [5] registered Dec 13 14:14:57.946229 kernel: acpiphp: Slot [6] registered Dec 13 14:14:57.946245 kernel: acpiphp: Slot [7] registered Dec 13 14:14:57.946266 kernel: acpiphp: Slot [8] registered Dec 13 14:14:57.946283 kernel: acpiphp: Slot [9] registered Dec 13 14:14:57.946299 kernel: acpiphp: Slot [10] registered Dec 13 14:14:57.946315 kernel: acpiphp: Slot [11] registered Dec 13 14:14:57.946331 kernel: acpiphp: Slot [12] registered Dec 13 14:14:57.946382 kernel: acpiphp: Slot [13] registered Dec 13 14:14:57.946399 kernel: acpiphp: Slot [14] registered Dec 13 14:14:57.946416 kernel: acpiphp: Slot [15] registered Dec 13 14:14:57.946433 kernel: acpiphp: Slot [16] registered Dec 13 14:14:57.946465 kernel: acpiphp: Slot [17] registered Dec 13 14:14:57.946485 kernel: acpiphp: Slot [18] registered Dec 13 14:14:57.946502 kernel: acpiphp: Slot [19] registered Dec 13 14:14:57.946518 kernel: acpiphp: Slot [20] registered Dec 13 14:14:57.946535 kernel: acpiphp: Slot [21] registered Dec 13 14:14:57.946554 kernel: acpiphp: Slot [22] registered Dec 13 14:14:57.946572 kernel: acpiphp: Slot [23] registered Dec 13 14:14:57.946589 kernel: acpiphp: Slot [24] registered Dec 13 14:14:57.946605 kernel: acpiphp: Slot [25] registered Dec 13 14:14:57.946621 kernel: acpiphp: Slot [26] registered Dec 13 14:14:57.946641 kernel: acpiphp: Slot [27] registered Dec 13 14:14:57.946657 kernel: acpiphp: Slot [28] registered Dec 13 14:14:57.946673 kernel: acpiphp: Slot [29] registered Dec 13 14:14:57.946689 kernel: acpiphp: Slot [30] registered Dec 13 14:14:57.946705 kernel: acpiphp: Slot [31] registered Dec 13 14:14:57.946722 kernel: PCI host bridge to bus 0000:00 Dec 13 14:14:57.946925 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Dec 13 14:14:57.947097 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:14:57.947270 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Dec 13 14:14:57.947478 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Dec 13 14:14:57.947691 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Dec 13 14:14:57.947910 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Dec 13 14:14:57.948102 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Dec 13 14:14:57.948302 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:14:57.948526 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Dec 13 14:14:57.948717 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:14:57.948918 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:14:57.949134 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Dec 13 14:14:57.949327 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Dec 13 14:14:57.949546 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Dec 13 14:14:57.949733 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:14:57.949928 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Dec 13 14:14:57.950141 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Dec 13 14:14:57.950350 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Dec 13 14:14:57.950560 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Dec 13 14:14:57.950760 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Dec 13 14:14:57.950936 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Dec 13 14:14:57.951103 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:14:57.951298 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Dec 13 14:14:57.951324 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:14:57.951359 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:14:57.951378 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:14:57.951395 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:14:57.951412 kernel: iommu: Default domain type: Translated Dec 13 14:14:57.951428 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:14:57.951445 kernel: vgaarb: loaded Dec 13 14:14:57.951461 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:14:57.951483 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:14:57.951499 kernel: PTP clock support registered Dec 13 14:14:57.951515 kernel: Registered efivars operations Dec 13 14:14:57.951532 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:14:57.951548 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:14:57.951564 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:14:57.951580 kernel: pnp: PnP ACPI init Dec 13 14:14:57.951797 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Dec 13 14:14:57.951826 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:14:57.951843 kernel: NET: Registered PF_INET protocol family Dec 13 14:14:57.951860 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:14:57.951877 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:14:57.951893 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:14:57.951910 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:14:57.951926 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:14:57.951943 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:14:57.951959 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:14:57.951979 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:14:57.951996 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:14:57.952012 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:14:57.952028 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Dec 13 14:14:57.952045 kernel: kvm [1]: HYP mode not available Dec 13 14:14:57.952061 kernel: Initialise system trusted keyrings Dec 13 14:14:57.952077 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:14:57.952094 kernel: Key type asymmetric registered Dec 13 14:14:57.952110 kernel: Asymmetric key parser 'x509' registered Dec 13 14:14:57.952130 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:14:57.952147 kernel: io scheduler mq-deadline registered Dec 13 14:14:57.952163 kernel: io scheduler kyber registered Dec 13 14:14:57.952179 kernel: io scheduler bfq registered Dec 13 14:14:57.955825 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Dec 13 14:14:57.955868 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:14:57.955886 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:14:57.955903 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Dec 13 14:14:57.955928 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:14:57.955945 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:14:57.955963 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Dec 13 14:14:57.960780 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Dec 13 14:14:57.960812 kernel: printk: console [ttyS0] disabled Dec 13 14:14:57.960831 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Dec 13 14:14:57.960848 kernel: printk: console [ttyS0] enabled Dec 13 14:14:57.960865 kernel: printk: bootconsole [uart0] disabled Dec 13 14:14:57.960881 kernel: thunder_xcv, ver 1.0 Dec 13 14:14:57.960897 kernel: thunder_bgx, ver 1.0 Dec 13 14:14:57.960920 kernel: nicpf, ver 1.0 Dec 13 14:14:57.960937 kernel: nicvf, ver 1.0 Dec 13 14:14:57.961189 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:14:57.961439 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:14:57 UTC (1734099297) Dec 13 14:14:57.961465 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:14:57.961483 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:14:57.961499 kernel: Segment Routing with IPv6 Dec 13 14:14:57.961516 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:14:57.961538 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:14:57.961554 kernel: Key type dns_resolver registered Dec 13 14:14:57.961570 kernel: registered taskstats version 1 Dec 13 14:14:57.961587 kernel: Loading compiled-in X.509 certificates Dec 13 14:14:57.961603 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:14:57.961619 kernel: Key type .fscrypt registered Dec 13 14:14:57.961635 kernel: Key type fscrypt-provisioning registered Dec 13 14:14:57.961651 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:14:57.961667 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:14:57.961688 kernel: ima: No architecture policies found Dec 13 14:14:57.961704 kernel: clk: Disabling unused clocks Dec 13 14:14:57.961720 kernel: Freeing unused kernel memory: 36416K Dec 13 14:14:57.961736 kernel: Run /init as init process Dec 13 14:14:57.961752 kernel: with arguments: Dec 13 14:14:57.961768 kernel: /init Dec 13 14:14:57.961784 kernel: with environment: Dec 13 14:14:57.961799 kernel: HOME=/ Dec 13 14:14:57.961815 kernel: TERM=linux Dec 13 14:14:57.961835 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:14:57.961856 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:14:57.961878 systemd[1]: Detected virtualization amazon. Dec 13 14:14:57.961896 systemd[1]: Detected architecture arm64. Dec 13 14:14:57.961913 systemd[1]: Running in initrd. Dec 13 14:14:57.961931 systemd[1]: No hostname configured, using default hostname. Dec 13 14:14:57.961948 systemd[1]: Hostname set to . Dec 13 14:14:57.961970 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:14:57.961988 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:14:57.962006 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:14:57.962023 systemd[1]: Reached target cryptsetup.target. Dec 13 14:14:57.962040 systemd[1]: Reached target paths.target. Dec 13 14:14:57.962058 systemd[1]: Reached target slices.target. Dec 13 14:14:57.962075 systemd[1]: Reached target swap.target. Dec 13 14:14:57.962093 systemd[1]: Reached target timers.target. Dec 13 14:14:57.962115 systemd[1]: Listening on iscsid.socket. Dec 13 14:14:57.962133 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:14:57.962161 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:14:57.962184 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:14:57.962203 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:14:57.962221 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:14:57.962239 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:14:57.962257 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:14:57.962279 systemd[1]: Reached target sockets.target. Dec 13 14:14:57.962298 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:14:57.962315 systemd[1]: Finished network-cleanup.service. Dec 13 14:14:57.962346 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:14:57.962370 systemd[1]: Starting systemd-journald.service... Dec 13 14:14:57.962389 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:14:57.962407 systemd[1]: Starting systemd-resolved.service... Dec 13 14:14:57.962425 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:14:57.962443 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:14:57.962466 kernel: audit: type=1130 audit(1734099297.954:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:57.962487 systemd-journald[310]: Journal started Dec 13 14:14:57.962568 systemd-journald[310]: Runtime Journal (/run/log/journal/ec20fddb0d1da846d3d2758b634dc244) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:14:57.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:57.946529 systemd-modules-load[311]: Inserted module 'overlay' Dec 13 14:14:57.984192 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:14:57.984229 systemd[1]: Started systemd-journald.service. Dec 13 14:14:57.984254 kernel: audit: type=1130 audit(1734099297.967:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:57.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:57.980729 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:14:57.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:57.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.006111 kernel: audit: type=1130 audit(1734099297.979:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.006162 kernel: audit: type=1130 audit(1734099297.991:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.022107 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:14:58.023487 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:14:58.043497 systemd-resolved[312]: Positive Trust Anchors: Dec 13 14:14:58.047281 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:14:58.056318 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:14:58.064970 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:14:58.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.071931 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:14:58.117374 kernel: audit: type=1130 audit(1734099298.056:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.117441 kernel: Bridge firewalling registered Dec 13 14:14:58.117465 kernel: audit: type=1130 audit(1734099298.103:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.097430 systemd-modules-load[311]: Inserted module 'br_netfilter' Dec 13 14:14:58.126426 kernel: SCSI subsystem initialized Dec 13 14:14:58.101514 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:14:58.106408 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:14:58.151286 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:14:58.151373 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:14:58.151402 dracut-cmdline[328]: dracut-dracut-053 Dec 13 14:14:58.159526 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:14:58.159795 dracut-cmdline[328]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:14:58.184289 systemd-modules-load[311]: Inserted module 'dm_multipath' Dec 13 14:14:58.185722 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:14:58.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.194214 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:14:58.222378 kernel: audit: type=1130 audit(1734099298.191:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.220446 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:14:58.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.250383 kernel: audit: type=1130 audit(1734099298.220:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.314367 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:14:58.335375 kernel: iscsi: registered transport (tcp) Dec 13 14:14:58.362109 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:14:58.362178 kernel: QLogic iSCSI HBA Driver Dec 13 14:14:58.558143 systemd-resolved[312]: Defaulting to hostname 'linux'. Dec 13 14:14:58.559866 kernel: random: crng init done Dec 13 14:14:58.561171 systemd[1]: Started systemd-resolved.service. Dec 13 14:14:58.572501 kernel: audit: type=1130 audit(1734099298.561:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.562906 systemd[1]: Reached target nss-lookup.target. Dec 13 14:14:58.587216 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:14:58.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:58.592077 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:14:58.656379 kernel: raid6: neonx8 gen() 6358 MB/s Dec 13 14:14:58.674366 kernel: raid6: neonx8 xor() 4798 MB/s Dec 13 14:14:58.692366 kernel: raid6: neonx4 gen() 6502 MB/s Dec 13 14:14:58.710366 kernel: raid6: neonx4 xor() 5003 MB/s Dec 13 14:14:58.728365 kernel: raid6: neonx2 gen() 5718 MB/s Dec 13 14:14:58.746366 kernel: raid6: neonx2 xor() 4574 MB/s Dec 13 14:14:58.764366 kernel: raid6: neonx1 gen() 4442 MB/s Dec 13 14:14:58.782366 kernel: raid6: neonx1 xor() 3707 MB/s Dec 13 14:14:58.800366 kernel: raid6: int64x8 gen() 3405 MB/s Dec 13 14:14:58.818366 kernel: raid6: int64x8 xor() 2093 MB/s Dec 13 14:14:58.836366 kernel: raid6: int64x4 gen() 3776 MB/s Dec 13 14:14:58.854366 kernel: raid6: int64x4 xor() 2197 MB/s Dec 13 14:14:58.872366 kernel: raid6: int64x2 gen() 3558 MB/s Dec 13 14:14:58.890366 kernel: raid6: int64x2 xor() 1952 MB/s Dec 13 14:14:58.908366 kernel: raid6: int64x1 gen() 2756 MB/s Dec 13 14:14:58.927525 kernel: raid6: int64x1 xor() 1452 MB/s Dec 13 14:14:58.927558 kernel: raid6: using algorithm neonx4 gen() 6502 MB/s Dec 13 14:14:58.927583 kernel: raid6: .... xor() 5003 MB/s, rmw enabled Dec 13 14:14:58.929158 kernel: raid6: using neon recovery algorithm Dec 13 14:14:58.948688 kernel: xor: measuring software checksum speed Dec 13 14:14:58.948757 kernel: 8regs : 9301 MB/sec Dec 13 14:14:58.950426 kernel: 32regs : 11106 MB/sec Dec 13 14:14:58.952216 kernel: arm64_neon : 9588 MB/sec Dec 13 14:14:58.952245 kernel: xor: using function: 32regs (11106 MB/sec) Dec 13 14:14:59.048393 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:14:59.067197 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:14:59.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:59.068000 audit: BPF prog-id=7 op=LOAD Dec 13 14:14:59.068000 audit: BPF prog-id=8 op=LOAD Dec 13 14:14:59.072149 systemd[1]: Starting systemd-udevd.service... Dec 13 14:14:59.099490 systemd-udevd[510]: Using default interface naming scheme 'v252'. Dec 13 14:14:59.110204 systemd[1]: Started systemd-udevd.service. Dec 13 14:14:59.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:59.116168 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:14:59.143891 dracut-pre-trigger[514]: rd.md=0: removing MD RAID activation Dec 13 14:14:59.206614 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:14:59.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:59.210819 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:14:59.311957 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:14:59.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:59.434328 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:14:59.434431 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Dec 13 14:14:59.456796 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Dec 13 14:14:59.456827 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:14:59.457130 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:14:59.457439 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:14:59.457669 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:14:59.457887 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:55:b7:83:d9:6f Dec 13 14:14:59.464498 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:14:59.464554 kernel: GPT:9289727 != 16777215 Dec 13 14:14:59.464578 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:14:59.466448 kernel: GPT:9289727 != 16777215 Dec 13 14:14:59.467578 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:14:59.470648 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:14:59.476113 (udev-worker)[562]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:14:59.537385 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (570) Dec 13 14:14:59.554554 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:14:59.598906 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:14:59.642444 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:14:59.646839 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:14:59.662974 systemd[1]: Starting disk-uuid.service... Dec 13 14:14:59.679666 disk-uuid[670]: Primary Header is updated. Dec 13 14:14:59.679666 disk-uuid[670]: Secondary Entries is updated. Dec 13 14:14:59.679666 disk-uuid[670]: Secondary Header is updated. Dec 13 14:14:59.680995 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:14:59.705997 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:14:59.715376 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:14:59.723368 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:00.715382 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:00.716789 disk-uuid[671]: The operation has completed successfully. Dec 13 14:15:00.870061 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:15:00.870272 systemd[1]: Finished disk-uuid.service. Dec 13 14:15:00.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:00.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:00.902682 systemd[1]: Starting verity-setup.service... Dec 13 14:15:00.953391 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:15:01.042316 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:15:01.048374 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:15:01.054518 systemd[1]: Finished verity-setup.service. Dec 13 14:15:01.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.138383 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:15:01.139196 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:15:01.142023 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:15:01.145881 systemd[1]: Starting ignition-setup.service... Dec 13 14:15:01.148671 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:15:01.177353 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:01.177425 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:01.179677 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:01.187856 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:01.205966 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:15:01.246320 systemd[1]: Finished ignition-setup.service. Dec 13 14:15:01.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.251219 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:15:01.288248 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:15:01.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.290000 audit: BPF prog-id=9 op=LOAD Dec 13 14:15:01.293322 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:01.338790 systemd-networkd[1183]: lo: Link UP Dec 13 14:15:01.338810 systemd-networkd[1183]: lo: Gained carrier Dec 13 14:15:01.342229 systemd-networkd[1183]: Enumeration completed Dec 13 14:15:01.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.342714 systemd-networkd[1183]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:01.342947 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:01.344661 systemd[1]: Reached target network.target. Dec 13 14:15:01.349537 systemd[1]: Starting iscsiuio.service... Dec 13 14:15:01.353614 systemd-networkd[1183]: eth0: Link UP Dec 13 14:15:01.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.353623 systemd-networkd[1183]: eth0: Gained carrier Dec 13 14:15:01.363613 systemd[1]: Started iscsiuio.service. Dec 13 14:15:01.369124 systemd[1]: Starting iscsid.service... Dec 13 14:15:01.381483 systemd[1]: Started iscsid.service. Dec 13 14:15:01.384422 iscsid[1188]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:01.384422 iscsid[1188]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:15:01.384422 iscsid[1188]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:15:01.384422 iscsid[1188]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:15:01.384422 iscsid[1188]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:15:01.384422 iscsid[1188]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:01.384422 iscsid[1188]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:15:01.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:01.386225 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:15:01.410951 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:15:01.413765 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:15:01.430064 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:01.431738 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:01.434594 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:15:01.438543 systemd-networkd[1183]: eth0: DHCPv4 address 172.31.29.32/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:01.456604 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:15:01.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.375481 ignition[1157]: Ignition 2.14.0 Dec 13 14:15:02.375508 ignition[1157]: Stage: fetch-offline Dec 13 14:15:02.375815 ignition[1157]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:02.375898 ignition[1157]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:02.394031 ignition[1157]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:02.395765 ignition[1157]: Ignition finished successfully Dec 13 14:15:02.398953 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:15:02.416473 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:15:02.416511 kernel: audit: type=1130 audit(1734099302.399:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.402113 systemd[1]: Starting ignition-fetch.service... Dec 13 14:15:02.422744 ignition[1208]: Ignition 2.14.0 Dec 13 14:15:02.422773 ignition[1208]: Stage: fetch Dec 13 14:15:02.423091 ignition[1208]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:02.423150 ignition[1208]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:02.437658 ignition[1208]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:02.439847 ignition[1208]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:02.457868 ignition[1208]: INFO : PUT result: OK Dec 13 14:15:02.460871 ignition[1208]: DEBUG : parsed url from cmdline: "" Dec 13 14:15:02.460871 ignition[1208]: INFO : no config URL provided Dec 13 14:15:02.460871 ignition[1208]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:15:02.466410 ignition[1208]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:15:02.466410 ignition[1208]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:02.470474 ignition[1208]: INFO : PUT result: OK Dec 13 14:15:02.471921 ignition[1208]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:15:02.474649 ignition[1208]: INFO : GET result: OK Dec 13 14:15:02.476041 ignition[1208]: DEBUG : parsing config with SHA512: 7c45b223a3214b9a85879722f754f5949ac639954b1f6daef66e4637cfae0c96bd8d3ea83534a1e3e51b7a4a14f3687bb080022b2105be6f672f7b8551155b39 Dec 13 14:15:02.484082 unknown[1208]: fetched base config from "system" Dec 13 14:15:02.484120 unknown[1208]: fetched base config from "system" Dec 13 14:15:02.486574 ignition[1208]: fetch: fetch complete Dec 13 14:15:02.484145 unknown[1208]: fetched user config from "aws" Dec 13 14:15:02.486589 ignition[1208]: fetch: fetch passed Dec 13 14:15:02.486706 ignition[1208]: Ignition finished successfully Dec 13 14:15:02.495905 systemd[1]: Finished ignition-fetch.service. Dec 13 14:15:02.513170 kernel: audit: type=1130 audit(1734099302.494:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.499169 systemd[1]: Starting ignition-kargs.service... Dec 13 14:15:02.523462 ignition[1214]: Ignition 2.14.0 Dec 13 14:15:02.525043 ignition[1214]: Stage: kargs Dec 13 14:15:02.526488 ignition[1214]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:02.528651 ignition[1214]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:02.539247 ignition[1214]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:02.541444 ignition[1214]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:02.544348 ignition[1214]: INFO : PUT result: OK Dec 13 14:15:02.548959 ignition[1214]: kargs: kargs passed Dec 13 14:15:02.549084 ignition[1214]: Ignition finished successfully Dec 13 14:15:02.552497 systemd[1]: Finished ignition-kargs.service. Dec 13 14:15:02.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.556832 systemd[1]: Starting ignition-disks.service... Dec 13 14:15:02.577111 kernel: audit: type=1130 audit(1734099302.553:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.572192 ignition[1220]: Ignition 2.14.0 Dec 13 14:15:02.572228 ignition[1220]: Stage: disks Dec 13 14:15:02.572648 ignition[1220]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:02.572729 ignition[1220]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:02.587357 ignition[1220]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:02.589485 ignition[1220]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:02.592446 ignition[1220]: INFO : PUT result: OK Dec 13 14:15:02.596921 ignition[1220]: disks: disks passed Dec 13 14:15:02.598458 ignition[1220]: Ignition finished successfully Dec 13 14:15:02.601540 systemd[1]: Finished ignition-disks.service. Dec 13 14:15:02.604586 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:15:02.607728 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:02.633162 kernel: audit: type=1130 audit(1734099302.603:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.609295 systemd[1]: Reached target local-fs.target. Dec 13 14:15:02.617169 systemd[1]: Reached target sysinit.target. Dec 13 14:15:02.618621 systemd[1]: Reached target basic.target. Dec 13 14:15:02.634210 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:15:02.684442 systemd-fsck[1228]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:15:02.692302 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:15:02.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.695402 systemd[1]: Mounting sysroot.mount... Dec 13 14:15:02.705573 kernel: audit: type=1130 audit(1734099302.692:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:02.720362 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:15:02.722078 systemd[1]: Mounted sysroot.mount. Dec 13 14:15:02.724965 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:15:02.749636 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:15:02.753767 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:15:02.756717 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:15:02.759937 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:15:02.764617 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:15:02.794414 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:02.799155 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:15:02.817568 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1245) Dec 13 14:15:02.821120 initrd-setup-root[1250]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:15:02.825822 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:02.825863 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:02.825894 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:02.836375 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:02.840392 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:02.846644 initrd-setup-root[1276]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:15:02.855398 initrd-setup-root[1284]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:15:02.863951 initrd-setup-root[1292]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:15:03.107785 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:15:03.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:03.112035 systemd[1]: Starting ignition-mount.service... Dec 13 14:15:03.120903 kernel: audit: type=1130 audit(1734099303.109:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:03.122208 systemd[1]: Starting sysroot-boot.service... Dec 13 14:15:03.134389 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:03.134569 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:03.166414 systemd[1]: Finished sysroot-boot.service. Dec 13 14:15:03.172664 ignition[1312]: INFO : Ignition 2.14.0 Dec 13 14:15:03.172664 ignition[1312]: INFO : Stage: mount Dec 13 14:15:03.172664 ignition[1312]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:03.172664 ignition[1312]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:03.194887 kernel: audit: type=1130 audit(1734099303.173:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:03.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:03.194995 ignition[1312]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:03.194995 ignition[1312]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:03.199577 ignition[1312]: INFO : PUT result: OK Dec 13 14:15:03.207876 ignition[1312]: INFO : mount: mount passed Dec 13 14:15:03.209686 ignition[1312]: INFO : Ignition finished successfully Dec 13 14:15:03.212573 systemd[1]: Finished ignition-mount.service. Dec 13 14:15:03.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:03.216745 systemd[1]: Starting ignition-files.service... Dec 13 14:15:03.226572 kernel: audit: type=1130 audit(1734099303.214:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:03.225274 systemd-networkd[1183]: eth0: Gained IPv6LL Dec 13 14:15:03.234320 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:03.254385 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1320) Dec 13 14:15:03.259461 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:03.259496 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:03.259520 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:03.268375 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:03.272824 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:03.289352 ignition[1339]: INFO : Ignition 2.14.0 Dec 13 14:15:03.289352 ignition[1339]: INFO : Stage: files Dec 13 14:15:03.292487 ignition[1339]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:03.292487 ignition[1339]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:03.309118 ignition[1339]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:03.311482 ignition[1339]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:03.314298 ignition[1339]: INFO : PUT result: OK Dec 13 14:15:03.318908 ignition[1339]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:15:03.322322 ignition[1339]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:15:03.322322 ignition[1339]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:15:03.367621 ignition[1339]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:15:03.370227 ignition[1339]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:15:03.373871 unknown[1339]: wrote ssh authorized keys file for user: core Dec 13 14:15:03.375931 ignition[1339]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:15:03.389567 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:03.392764 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:03.402719 ignition[1339]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1225297075" Dec 13 14:15:03.402719 ignition[1339]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1225297075": device or resource busy Dec 13 14:15:03.402719 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1225297075", trying btrfs: device or resource busy Dec 13 14:15:03.402719 ignition[1339]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1225297075" Dec 13 14:15:03.419852 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1342) Dec 13 14:15:03.419888 ignition[1339]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1225297075" Dec 13 14:15:03.437138 ignition[1339]: INFO : op(3): [started] unmounting "/mnt/oem1225297075" Dec 13 14:15:03.439225 ignition[1339]: INFO : op(3): [finished] unmounting "/mnt/oem1225297075" Dec 13 14:15:03.439225 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:03.439225 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:03.447495 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:03.450645 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:03.453850 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:03.456965 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:03.461581 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:03.465973 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:03.469447 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:03.481952 ignition[1339]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4107195941" Dec 13 14:15:03.481952 ignition[1339]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4107195941": device or resource busy Dec 13 14:15:03.481952 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4107195941", trying btrfs: device or resource busy Dec 13 14:15:03.481952 ignition[1339]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4107195941" Dec 13 14:15:03.481952 ignition[1339]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4107195941" Dec 13 14:15:03.481952 ignition[1339]: INFO : op(6): [started] unmounting "/mnt/oem4107195941" Dec 13 14:15:03.481952 ignition[1339]: INFO : op(6): [finished] unmounting "/mnt/oem4107195941" Dec 13 14:15:03.481952 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:03.481952 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:03.481952 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:03.520855 ignition[1339]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486605623" Dec 13 14:15:03.523549 ignition[1339]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486605623": device or resource busy Dec 13 14:15:03.523549 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2486605623", trying btrfs: device or resource busy Dec 13 14:15:03.523549 ignition[1339]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486605623" Dec 13 14:15:03.523549 ignition[1339]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486605623" Dec 13 14:15:03.534865 ignition[1339]: INFO : op(9): [started] unmounting "/mnt/oem2486605623" Dec 13 14:15:03.534865 ignition[1339]: INFO : op(9): [finished] unmounting "/mnt/oem2486605623" Dec 13 14:15:03.534865 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:03.542103 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:03.545490 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:03.562965 ignition[1339]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3012151246" Dec 13 14:15:03.562965 ignition[1339]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3012151246": device or resource busy Dec 13 14:15:03.562965 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3012151246", trying btrfs: device or resource busy Dec 13 14:15:03.562965 ignition[1339]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3012151246" Dec 13 14:15:03.562965 ignition[1339]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3012151246" Dec 13 14:15:03.562965 ignition[1339]: INFO : op(c): [started] unmounting "/mnt/oem3012151246" Dec 13 14:15:03.562965 ignition[1339]: INFO : op(c): [finished] unmounting "/mnt/oem3012151246" Dec 13 14:15:03.562965 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:03.562965 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:03.562965 ignition[1339]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 14:15:03.998783 ignition[1339]: INFO : GET result: OK Dec 13 14:15:04.451760 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(e): [started] processing unit "nvidia.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(e): [finished] processing unit "nvidia.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(10): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(10): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Dec 13 14:15:04.456634 ignition[1339]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:15:04.501381 ignition[1339]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:04.501381 ignition[1339]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:04.501381 ignition[1339]: INFO : files: files passed Dec 13 14:15:04.501381 ignition[1339]: INFO : Ignition finished successfully Dec 13 14:15:04.525138 kernel: audit: type=1130 audit(1734099304.508:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.508780 systemd[1]: Finished ignition-files.service. Dec 13 14:15:04.520659 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:15:04.530598 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:15:04.537163 systemd[1]: Starting ignition-quench.service... Dec 13 14:15:04.545811 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:15:04.546750 systemd[1]: Finished ignition-quench.service. Dec 13 14:15:04.552195 initrd-setup-root-after-ignition[1364]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:15:04.561621 kernel: audit: type=1130 audit(1734099304.549:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.562101 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:15:04.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.565749 systemd[1]: Reached target ignition-complete.target. Dec 13 14:15:04.570124 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:15:04.597136 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:15:04.599147 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:15:04.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.602320 systemd[1]: Reached target initrd-fs.target. Dec 13 14:15:04.605206 systemd[1]: Reached target initrd.target. Dec 13 14:15:04.607977 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:15:04.611753 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:15:04.633935 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:15:04.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.637149 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:15:04.657262 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:15:04.660524 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:15:04.663950 systemd[1]: Stopped target timers.target. Dec 13 14:15:04.666891 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:15:04.668895 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:15:04.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.672316 systemd[1]: Stopped target initrd.target. Dec 13 14:15:04.675271 systemd[1]: Stopped target basic.target. Dec 13 14:15:04.678142 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:15:04.681386 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:15:04.684555 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:15:04.687870 systemd[1]: Stopped target remote-fs.target. Dec 13 14:15:04.690811 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:15:04.693949 systemd[1]: Stopped target sysinit.target. Dec 13 14:15:04.696796 systemd[1]: Stopped target local-fs.target. Dec 13 14:15:04.699656 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:15:04.702739 systemd[1]: Stopped target swap.target. Dec 13 14:15:04.704221 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:15:04.707582 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:15:04.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.710659 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:15:04.713906 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:15:04.715860 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:15:04.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.718876 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:15:04.721076 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:15:04.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.724802 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:15:04.726640 systemd[1]: Stopped ignition-files.service. Dec 13 14:15:04.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.731182 systemd[1]: Stopping ignition-mount.service... Dec 13 14:15:04.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.757566 ignition[1377]: INFO : Ignition 2.14.0 Dec 13 14:15:04.757566 ignition[1377]: INFO : Stage: umount Dec 13 14:15:04.757566 ignition[1377]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:04.757566 ignition[1377]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:04.734862 systemd[1]: Stopping iscsiuio.service... Dec 13 14:15:04.737936 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:15:04.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.745937 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:15:04.746424 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:15:04.753004 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:15:04.753386 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:15:04.765841 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:15:04.766086 systemd[1]: Stopped iscsiuio.service. Dec 13 14:15:04.783821 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:15:04.805281 ignition[1377]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:04.805281 ignition[1377]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:04.810218 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:15:04.812111 ignition[1377]: INFO : PUT result: OK Dec 13 14:15:04.813896 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:15:04.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.817987 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:15:04.819780 ignition[1377]: INFO : umount: umount passed Dec 13 14:15:04.819780 ignition[1377]: INFO : Ignition finished successfully Dec 13 14:15:04.821488 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:15:04.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.827463 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:15:04.828016 systemd[1]: Stopped ignition-mount.service. Dec 13 14:15:04.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.831451 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:15:04.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.831537 systemd[1]: Stopped ignition-disks.service. Dec 13 14:15:04.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.833819 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:15:04.834171 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:15:04.836987 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:15:04.837067 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:15:04.839110 systemd[1]: Stopped target network.target. Dec 13 14:15:04.841306 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:15:04.841402 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:15:04.843028 systemd[1]: Stopped target paths.target. Dec 13 14:15:04.844399 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:15:04.853702 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:15:04.862105 systemd[1]: Stopped target slices.target. Dec 13 14:15:04.863469 systemd[1]: Stopped target sockets.target. Dec 13 14:15:04.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.864982 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:15:04.865045 systemd[1]: Closed iscsid.socket. Dec 13 14:15:04.866582 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:15:04.866655 systemd[1]: Closed iscsiuio.socket. Dec 13 14:15:04.868928 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:15:04.869028 systemd[1]: Stopped ignition-setup.service. Dec 13 14:15:04.870733 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:15:04.870810 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:15:04.873717 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:15:04.875281 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:15:04.880864 systemd-networkd[1183]: eth0: DHCPv6 lease lost Dec 13 14:15:04.885437 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:15:04.885680 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:15:04.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.900410 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:15:04.900741 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:15:04.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.904000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:15:04.904000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:15:04.905853 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:15:04.905941 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:15:04.911644 systemd[1]: Stopping network-cleanup.service... Dec 13 14:15:04.914549 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:15:04.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.914914 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:15:04.918455 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:15:04.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.918549 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:15:04.921135 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:15:04.921284 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:15:04.924771 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:15:04.938483 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:15:04.950201 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:15:04.950587 systemd[1]: Stopped network-cleanup.service. Dec 13 14:15:04.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.955567 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:15:04.957457 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:15:04.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.960693 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:15:04.960790 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:15:04.965606 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:15:04.965692 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:15:04.968894 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:15:04.972140 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:15:04.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.974936 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:15:04.975017 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:15:04.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.979608 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:15:04.979684 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:15:04.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:04.985656 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:15:05.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:05.002461 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:15:05.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:05.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:05.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:05.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:05.002601 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:15:05.006242 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:15:05.006362 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:15:05.009810 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:15:05.009887 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:15:05.013246 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:15:05.014094 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:15:05.014260 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:15:05.016266 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:15:05.022239 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:15:05.056932 systemd[1]: Switching root. Dec 13 14:15:05.084187 iscsid[1188]: iscsid shutting down. Dec 13 14:15:05.085676 systemd-journald[310]: Received SIGTERM from PID 1 (n/a). Dec 13 14:15:05.085760 systemd-journald[310]: Journal stopped Dec 13 14:15:12.291980 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:15:12.292081 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:15:12.292122 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:15:12.292154 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:15:12.292185 kernel: SELinux: policy capability open_perms=1 Dec 13 14:15:12.292226 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:15:12.292259 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:15:12.292290 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:15:12.292329 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:15:12.299429 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:15:12.299476 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:15:12.299519 systemd[1]: Successfully loaded SELinux policy in 131.007ms. Dec 13 14:15:12.299571 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 33.106ms. Dec 13 14:15:12.299606 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:12.299639 systemd[1]: Detected virtualization amazon. Dec 13 14:15:12.299671 systemd[1]: Detected architecture arm64. Dec 13 14:15:12.299704 systemd[1]: Detected first boot. Dec 13 14:15:12.299737 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:12.299771 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:15:12.299804 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:15:12.299837 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:12.299869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:12.299905 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:12.299936 kernel: kauditd_printk_skb: 56 callbacks suppressed Dec 13 14:15:12.299964 kernel: audit: type=1334 audit(1734099311.909:88): prog-id=12 op=LOAD Dec 13 14:15:12.299999 kernel: audit: type=1334 audit(1734099311.909:89): prog-id=3 op=UNLOAD Dec 13 14:15:12.300029 kernel: audit: type=1334 audit(1734099311.911:90): prog-id=13 op=LOAD Dec 13 14:15:12.300060 kernel: audit: type=1334 audit(1734099311.913:91): prog-id=14 op=LOAD Dec 13 14:15:12.300089 kernel: audit: type=1334 audit(1734099311.913:92): prog-id=4 op=UNLOAD Dec 13 14:15:12.300118 kernel: audit: type=1334 audit(1734099311.913:93): prog-id=5 op=UNLOAD Dec 13 14:15:12.300149 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:15:12.300181 kernel: audit: type=1334 audit(1734099311.915:94): prog-id=15 op=LOAD Dec 13 14:15:12.300209 kernel: audit: type=1334 audit(1734099311.915:95): prog-id=12 op=UNLOAD Dec 13 14:15:12.302007 systemd[1]: Stopped iscsid.service. Dec 13 14:15:12.302052 kernel: audit: type=1334 audit(1734099311.917:96): prog-id=16 op=LOAD Dec 13 14:15:12.302083 kernel: audit: type=1334 audit(1734099311.919:97): prog-id=17 op=LOAD Dec 13 14:15:12.302115 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:15:12.302146 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:15:12.302186 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:12.302219 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:15:12.302249 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:15:12.302283 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:15:12.302315 systemd[1]: Created slice system-getty.slice. Dec 13 14:15:12.302367 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:15:12.302401 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:15:12.302432 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:15:12.302465 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:15:12.302497 systemd[1]: Created slice user.slice. Dec 13 14:15:12.302526 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:12.302561 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:15:12.302675 systemd[1]: Set up automount boot.automount. Dec 13 14:15:12.302714 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:15:12.302744 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:15:12.302776 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:15:12.302806 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:15:12.302839 systemd[1]: Reached target integritysetup.target. Dec 13 14:15:12.302869 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:12.302900 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:12.302934 systemd[1]: Reached target slices.target. Dec 13 14:15:12.302964 systemd[1]: Reached target swap.target. Dec 13 14:15:12.302993 systemd[1]: Reached target torcx.target. Dec 13 14:15:12.303024 systemd[1]: Reached target veritysetup.target. Dec 13 14:15:12.303055 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:15:12.303087 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:15:12.303118 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:12.303148 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:12.303178 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:12.303207 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:15:12.303241 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:15:12.303273 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:15:12.303304 systemd[1]: Mounting media.mount... Dec 13 14:15:12.303652 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:15:12.303688 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:15:12.303719 systemd[1]: Mounting tmp.mount... Dec 13 14:15:12.303750 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:15:12.303781 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:12.303813 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:12.303849 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:15:12.303883 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:12.303913 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:12.303947 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:12.303979 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:15:12.304010 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:12.304041 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:15:12.304075 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:15:12.304106 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:15:12.304140 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:15:12.304169 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:15:12.304200 systemd[1]: Stopped systemd-journald.service. Dec 13 14:15:12.304230 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:12.304259 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:12.304288 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:15:12.304320 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:15:12.304441 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:12.304477 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:15:12.304515 systemd[1]: Stopped verity-setup.service. Dec 13 14:15:12.304545 kernel: loop: module loaded Dec 13 14:15:12.304573 kernel: fuse: init (API version 7.34) Dec 13 14:15:12.304606 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:15:12.304639 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:15:12.304668 systemd[1]: Mounted media.mount. Dec 13 14:15:12.304697 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:15:12.304726 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:15:12.304755 systemd[1]: Mounted tmp.mount. Dec 13 14:15:12.304788 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:12.304818 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:15:12.304847 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:15:12.304877 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:12.304945 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:12.308455 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:12.308520 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:12.308560 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:12.308591 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:12.308622 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:15:12.308654 systemd-journald[1484]: Journal started Dec 13 14:15:12.308750 systemd-journald[1484]: Runtime Journal (/run/log/journal/ec20fddb0d1da846d3d2758b634dc244) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:06.399000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:15:06.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:06.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:06.666000 audit: BPF prog-id=10 op=LOAD Dec 13 14:15:06.666000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:15:06.666000 audit: BPF prog-id=11 op=LOAD Dec 13 14:15:06.666000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:15:07.025000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:15:07.025000 audit[1410]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.025000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:07.032000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:15:07.032000 audit[1410]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.032000 audit: CWD cwd="/" Dec 13 14:15:07.032000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:07.032000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:07.032000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:11.909000 audit: BPF prog-id=12 op=LOAD Dec 13 14:15:11.909000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:15:11.911000 audit: BPF prog-id=13 op=LOAD Dec 13 14:15:11.913000 audit: BPF prog-id=14 op=LOAD Dec 13 14:15:11.913000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:15:11.913000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:15:11.915000 audit: BPF prog-id=15 op=LOAD Dec 13 14:15:11.915000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:15:11.917000 audit: BPF prog-id=16 op=LOAD Dec 13 14:15:11.919000 audit: BPF prog-id=17 op=LOAD Dec 13 14:15:11.920000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:15:11.920000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:15:11.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.932000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:15:11.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.184000 audit: BPF prog-id=18 op=LOAD Dec 13 14:15:12.184000 audit: BPF prog-id=19 op=LOAD Dec 13 14:15:12.184000 audit: BPF prog-id=20 op=LOAD Dec 13 14:15:12.184000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:15:12.184000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:15:12.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.317407 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:15:12.317470 systemd[1]: Started systemd-journald.service. Dec 13 14:15:12.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.288000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:15:12.288000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffffacb09e0 a2=4000 a3=1 items=0 ppid=1 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:12.288000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:15:12.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.906484 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:15:07.023040 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:12.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.922976 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:15:07.023742 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:15:12.320157 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:07.023792 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:15:07.023862 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:15:07.023889 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:15:07.023953 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:15:07.023985 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:15:07.024437 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:15:07.024553 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:15:07.024590 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:15:07.025534 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:15:07.025619 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:15:07.025666 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:15:07.025706 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:15:07.025753 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:15:07.025791 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:15:10.937897 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:10.938442 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:10.938686 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:10.939143 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:10.939248 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:15:10.939403 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:15:12.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.324966 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:12.328706 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:12.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.331167 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:15:12.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.333810 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:15:12.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.336530 systemd[1]: Reached target network-pre.target. Dec 13 14:15:12.340751 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:15:12.344977 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:15:12.346567 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:15:12.354087 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:15:12.357892 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:15:12.359572 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:12.361899 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:15:12.363575 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:12.365952 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:12.372167 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:15:12.374120 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:15:12.406643 systemd-journald[1484]: Time spent on flushing to /var/log/journal/ec20fddb0d1da846d3d2758b634dc244 is 83.879ms for 1121 entries. Dec 13 14:15:12.406643 systemd-journald[1484]: System Journal (/var/log/journal/ec20fddb0d1da846d3d2758b634dc244) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:15:12.509476 systemd-journald[1484]: Received client request to flush runtime journal. Dec 13 14:15:12.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.430517 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:15:12.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.432800 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:15:12.455784 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:12.492874 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:12.496772 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:15:12.511069 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:15:12.515624 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:15:12.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.519557 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:15:12.527723 udevadm[1526]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:15:12.804390 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:15:12.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.808236 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:15:12.967466 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:15:12.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.353046 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:15:13.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.355000 audit: BPF prog-id=21 op=LOAD Dec 13 14:15:13.355000 audit: BPF prog-id=22 op=LOAD Dec 13 14:15:13.355000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:15:13.355000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:15:13.357718 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:13.394703 systemd-udevd[1532]: Using default interface naming scheme 'v252'. Dec 13 14:15:13.442870 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:13.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.444000 audit: BPF prog-id=23 op=LOAD Dec 13 14:15:13.447505 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:13.466000 audit: BPF prog-id=24 op=LOAD Dec 13 14:15:13.466000 audit: BPF prog-id=25 op=LOAD Dec 13 14:15:13.466000 audit: BPF prog-id=26 op=LOAD Dec 13 14:15:13.468938 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:15:13.518393 (udev-worker)[1541]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:13.548323 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:15:13.564887 systemd[1]: Started systemd-userdbd.service. Dec 13 14:15:13.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.764679 systemd-networkd[1536]: lo: Link UP Dec 13 14:15:13.764700 systemd-networkd[1536]: lo: Gained carrier Dec 13 14:15:13.765949 systemd-networkd[1536]: Enumeration completed Dec 13 14:15:13.766110 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:13.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.769983 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:15:13.772044 systemd-networkd[1536]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:13.778375 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:13.778643 systemd-networkd[1536]: eth0: Link UP Dec 13 14:15:13.778997 systemd-networkd[1536]: eth0: Gained carrier Dec 13 14:15:13.788580 systemd-networkd[1536]: eth0: DHCPv4 address 172.31.29.32/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:13.794408 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1552) Dec 13 14:15:13.910417 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:15:13.915085 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:15:13.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.919251 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:15:13.983765 lvm[1651]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:14.019924 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:15:14.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.022000 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:14.026012 systemd[1]: Starting lvm2-activation.service... Dec 13 14:15:14.034563 lvm[1652]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:14.073074 systemd[1]: Finished lvm2-activation.service. Dec 13 14:15:14.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.075030 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:14.076795 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:15:14.076968 systemd[1]: Reached target local-fs.target. Dec 13 14:15:14.078622 systemd[1]: Reached target machines.target. Dec 13 14:15:14.093172 systemd[1]: Starting ldconfig.service... Dec 13 14:15:14.095684 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:14.095964 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:14.098432 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:15:14.102515 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:15:14.106826 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:15:14.111041 systemd[1]: Starting systemd-sysext.service... Dec 13 14:15:14.127325 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1654 (bootctl) Dec 13 14:15:14.129763 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:15:14.145830 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:15:14.159618 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:14.159996 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:15:14.195486 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:15:14.199499 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 14:15:14.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.291238 systemd-fsck[1664]: fsck.fat 4.2 (2021-01-31) Dec 13 14:15:14.291238 systemd-fsck[1664]: /dev/nvme0n1p1: 236 files, 117175/258078 clusters Dec 13 14:15:14.294451 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:15:14.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.298963 systemd[1]: Mounting boot.mount... Dec 13 14:15:14.318135 systemd[1]: Mounted boot.mount. Dec 13 14:15:14.344487 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:15:14.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.424366 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:15:14.448381 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 14:15:14.464635 (sd-sysext)[1680]: Using extensions 'kubernetes'. Dec 13 14:15:14.467162 (sd-sysext)[1680]: Merged extensions into '/usr'. Dec 13 14:15:14.504521 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:15:14.506787 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:14.509741 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:14.516144 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:14.520233 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:14.521859 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:14.522169 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:14.530184 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:15:14.532718 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:14.533042 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:14.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.535739 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:14.536023 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:14.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.539570 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:14.539869 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:14.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.544383 systemd[1]: Finished systemd-sysext.service. Dec 13 14:15:14.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.548448 systemd[1]: Starting ensure-sysext.service... Dec 13 14:15:14.550229 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:14.550408 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:14.552739 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:15:14.572526 systemd[1]: Reloading. Dec 13 14:15:14.583882 systemd-tmpfiles[1687]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:15:14.586554 systemd-tmpfiles[1687]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:15:14.590760 systemd-tmpfiles[1687]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:15:14.652637 /usr/lib/systemd/system-generators/torcx-generator[1706]: time="2024-12-13T14:15:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:14.653356 /usr/lib/systemd/system-generators/torcx-generator[1706]: time="2024-12-13T14:15:14Z" level=info msg="torcx already run" Dec 13 14:15:14.911748 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:14.911785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:14.956630 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:15.112000 audit: BPF prog-id=27 op=LOAD Dec 13 14:15:15.112000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:15:15.112000 audit: BPF prog-id=28 op=LOAD Dec 13 14:15:15.112000 audit: BPF prog-id=29 op=LOAD Dec 13 14:15:15.112000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:15:15.112000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:15:15.115000 audit: BPF prog-id=30 op=LOAD Dec 13 14:15:15.115000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:15:15.122000 audit: BPF prog-id=31 op=LOAD Dec 13 14:15:15.122000 audit: BPF prog-id=32 op=LOAD Dec 13 14:15:15.122000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:15:15.122000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:15:15.124000 audit: BPF prog-id=33 op=LOAD Dec 13 14:15:15.124000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:15:15.124000 audit: BPF prog-id=34 op=LOAD Dec 13 14:15:15.124000 audit: BPF prog-id=35 op=LOAD Dec 13 14:15:15.124000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:15:15.124000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:15:15.147444 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:15:15.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.151813 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:15:15.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.161440 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:15:15.164633 systemd[1]: Starting audit-rules.service... Dec 13 14:15:15.169550 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:15:15.177000 audit: BPF prog-id=36 op=LOAD Dec 13 14:15:15.175691 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:15:15.180860 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:15.184000 audit: BPF prog-id=37 op=LOAD Dec 13 14:15:15.187975 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:15:15.192668 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:15:15.208257 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.211069 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:15.217471 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:15.222701 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:15.224416 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.224920 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:15.228972 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:15:15.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.231661 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:15.235242 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.235614 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.235838 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:15.236044 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:15.243019 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.247563 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:15.249297 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.249645 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:15.249966 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:15.256290 systemd[1]: Finished ensure-sysext.service. Dec 13 14:15:15.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.258686 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:15.258987 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:15.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.266000 audit[1768]: SYSTEM_BOOT pid=1768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.272593 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:15:15.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.279053 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:15.279381 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:15.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.286251 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:15.286582 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:15.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.288916 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:15.289199 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:15.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.291132 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:15.291239 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.327716 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:15:15.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.394000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:15:15.394000 audit[1787]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc99be6a0 a2=420 a3=0 items=0 ppid=1763 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:15.394000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:15:15.396385 augenrules[1787]: No rules Dec 13 14:15:15.397129 systemd-resolved[1766]: Positive Trust Anchors: Dec 13 14:15:15.397158 systemd-resolved[1766]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:15.397222 systemd-resolved[1766]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:15.398571 systemd[1]: Finished audit-rules.service. Dec 13 14:15:15.412607 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:15:15.414488 systemd[1]: Reached target time-set.target. Dec 13 14:15:15.462528 systemd-resolved[1766]: Defaulting to hostname 'linux'. Dec 13 14:15:15.465470 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:15.467218 systemd[1]: Reached target network.target. Dec 13 14:15:15.468745 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:15.510473 systemd-networkd[1536]: eth0: Gained IPv6LL Dec 13 14:15:15.513149 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:15:15.515224 systemd[1]: Reached target network-online.target. Dec 13 14:15:15.653880 systemd-timesyncd[1767]: Contacted time server 45.55.126.202:123 (0.flatcar.pool.ntp.org). Dec 13 14:15:15.654107 systemd-timesyncd[1767]: Initial clock synchronization to Fri 2024-12-13 14:15:15.743028 UTC. Dec 13 14:15:15.681294 ldconfig[1653]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:15:15.697620 systemd[1]: Finished ldconfig.service. Dec 13 14:15:15.701535 systemd[1]: Starting systemd-update-done.service... Dec 13 14:15:15.715662 systemd[1]: Finished systemd-update-done.service. Dec 13 14:15:15.717603 systemd[1]: Reached target sysinit.target. Dec 13 14:15:15.719700 systemd[1]: Started motdgen.path. Dec 13 14:15:15.721117 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:15:15.723530 systemd[1]: Started logrotate.timer. Dec 13 14:15:15.725421 systemd[1]: Started mdadm.timer. Dec 13 14:15:15.726696 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:15:15.728326 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:15:15.728582 systemd[1]: Reached target paths.target. Dec 13 14:15:15.730160 systemd[1]: Reached target timers.target. Dec 13 14:15:15.733046 systemd[1]: Listening on dbus.socket. Dec 13 14:15:15.737150 systemd[1]: Starting docker.socket... Dec 13 14:15:15.743563 systemd[1]: Listening on sshd.socket. Dec 13 14:15:15.745449 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:15.746449 systemd[1]: Listening on docker.socket. Dec 13 14:15:15.748236 systemd[1]: Reached target sockets.target. Dec 13 14:15:15.750000 systemd[1]: Reached target basic.target. Dec 13 14:15:15.751585 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.751776 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.753989 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:15:15.760549 systemd[1]: Starting containerd.service... Dec 13 14:15:15.764724 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:15:15.768766 systemd[1]: Starting dbus.service... Dec 13 14:15:15.773441 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:15:15.777564 systemd[1]: Starting extend-filesystems.service... Dec 13 14:15:15.779737 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:15:15.782449 systemd[1]: Starting kubelet.service... Dec 13 14:15:15.798586 systemd[1]: Starting motdgen.service... Dec 13 14:15:15.803328 systemd[1]: Started nvidia.service. Dec 13 14:15:15.808175 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:15:15.811363 jq[1800]: false Dec 13 14:15:15.819828 systemd[1]: Starting sshd-keygen.service... Dec 13 14:15:15.846477 systemd[1]: Starting systemd-logind.service... Dec 13 14:15:15.849071 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:15.849225 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:15:15.850205 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:15:15.854785 systemd[1]: Starting update-engine.service... Dec 13 14:15:15.871584 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:15:15.927151 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:15:15.927585 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:15:15.931243 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:15:15.931641 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:15:15.979626 jq[1811]: true Dec 13 14:15:15.985897 extend-filesystems[1801]: Found loop1 Dec 13 14:15:15.988320 extend-filesystems[1801]: Found nvme0n1 Dec 13 14:15:15.991128 extend-filesystems[1801]: Found nvme0n1p1 Dec 13 14:15:15.993330 extend-filesystems[1801]: Found nvme0n1p2 Dec 13 14:15:15.996118 extend-filesystems[1801]: Found nvme0n1p3 Dec 13 14:15:16.008549 extend-filesystems[1801]: Found usr Dec 13 14:15:16.012548 extend-filesystems[1801]: Found nvme0n1p4 Dec 13 14:15:16.014205 extend-filesystems[1801]: Found nvme0n1p6 Dec 13 14:15:16.016793 extend-filesystems[1801]: Found nvme0n1p7 Dec 13 14:15:16.030315 extend-filesystems[1801]: Found nvme0n1p9 Dec 13 14:15:16.032734 extend-filesystems[1801]: Checking size of /dev/nvme0n1p9 Dec 13 14:15:16.043970 dbus-daemon[1799]: [system] SELinux support is enabled Dec 13 14:15:16.044268 systemd[1]: Started dbus.service. Dec 13 14:15:16.049165 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:15:16.049239 systemd[1]: Reached target system-config.target. Dec 13 14:15:16.051068 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:15:16.051136 systemd[1]: Reached target user-config.target. Dec 13 14:15:16.057830 jq[1829]: true Dec 13 14:15:16.119902 dbus-daemon[1799]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1536 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:16.125995 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:15:16.153034 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:15:16.153512 systemd[1]: Finished motdgen.service. Dec 13 14:15:16.171656 extend-filesystems[1801]: Resized partition /dev/nvme0n1p9 Dec 13 14:15:16.176128 extend-filesystems[1857]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:15:16.201118 amazon-ssm-agent[1796]: 2024/12/13 14:15:16 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:15:16.207548 amazon-ssm-agent[1796]: Initializing new seelog logger Dec 13 14:15:16.207729 amazon-ssm-agent[1796]: New Seelog Logger Creation Complete Dec 13 14:15:16.218879 amazon-ssm-agent[1796]: 2024/12/13 14:15:16 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:16.218879 amazon-ssm-agent[1796]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:16.219258 amazon-ssm-agent[1796]: 2024/12/13 14:15:16 processing appconfig overrides Dec 13 14:15:16.230373 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:15:16.243678 update_engine[1810]: I1213 14:15:16.242949 1810 main.cc:92] Flatcar Update Engine starting Dec 13 14:15:16.248492 systemd[1]: Started update-engine.service. Dec 13 14:15:16.253433 systemd[1]: Started locksmithd.service. Dec 13 14:15:16.259246 update_engine[1810]: I1213 14:15:16.259183 1810 update_check_scheduler.cc:74] Next update check in 4m5s Dec 13 14:15:16.310372 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:15:16.355382 extend-filesystems[1857]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:15:16.355382 extend-filesystems[1857]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:15:16.355382 extend-filesystems[1857]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:15:16.377300 extend-filesystems[1801]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:15:16.379646 bash[1863]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:16.379915 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:15:16.380286 systemd[1]: Finished extend-filesystems.service. Dec 13 14:15:16.441926 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:15:16.444765 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:15:16.449095 systemd-logind[1809]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:15:16.449141 systemd-logind[1809]: Watching system buttons on /dev/input/event1 (Sleep Button) Dec 13 14:15:16.450113 systemd-logind[1809]: New seat seat0. Dec 13 14:15:16.453614 systemd[1]: Started systemd-logind.service. Dec 13 14:15:16.460268 dbus-daemon[1799]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:15:16.460536 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:15:16.463895 dbus-daemon[1799]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1846 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:16.468723 systemd[1]: Starting polkit.service... Dec 13 14:15:16.504872 env[1822]: time="2024-12-13T14:15:16.504798154Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:15:16.515593 polkitd[1881]: Started polkitd version 121 Dec 13 14:15:16.543623 polkitd[1881]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:15:16.544745 polkitd[1881]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:15:16.550221 polkitd[1881]: Finished loading, compiling and executing 2 rules Dec 13 14:15:16.551654 dbus-daemon[1799]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:15:16.551913 systemd[1]: Started polkit.service. Dec 13 14:15:16.554757 polkitd[1881]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:15:16.584822 systemd-resolved[1766]: System hostname changed to 'ip-172-31-29-32'. Dec 13 14:15:16.584829 systemd-hostnamed[1846]: Hostname set to (transient) Dec 13 14:15:16.704245 env[1822]: time="2024-12-13T14:15:16.704159060Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:15:16.704498 env[1822]: time="2024-12-13T14:15:16.704452362Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:16.709248 env[1822]: time="2024-12-13T14:15:16.709157883Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:16.709248 env[1822]: time="2024-12-13T14:15:16.709236511Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:16.709710 env[1822]: time="2024-12-13T14:15:16.709652864Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:16.709813 env[1822]: time="2024-12-13T14:15:16.709706400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:16.709813 env[1822]: time="2024-12-13T14:15:16.709741491Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:15:16.709813 env[1822]: time="2024-12-13T14:15:16.709767482Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:16.709975 env[1822]: time="2024-12-13T14:15:16.709942794Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:16.710469 env[1822]: time="2024-12-13T14:15:16.710416274Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:16.710744 env[1822]: time="2024-12-13T14:15:16.710688221Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:16.710824 env[1822]: time="2024-12-13T14:15:16.710737509Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:15:16.710935 env[1822]: time="2024-12-13T14:15:16.710876200Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:15:16.710935 env[1822]: time="2024-12-13T14:15:16.710902907Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:15:16.728792 env[1822]: time="2024-12-13T14:15:16.728693129Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:15:16.728978 env[1822]: time="2024-12-13T14:15:16.728795964Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:15:16.728978 env[1822]: time="2024-12-13T14:15:16.728856161Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:15:16.729124 env[1822]: time="2024-12-13T14:15:16.728983677Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.729185 env[1822]: time="2024-12-13T14:15:16.729136468Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.729245 env[1822]: time="2024-12-13T14:15:16.729195949Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.729245 env[1822]: time="2024-12-13T14:15:16.729231441Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.730014 env[1822]: time="2024-12-13T14:15:16.729927992Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.730223 env[1822]: time="2024-12-13T14:15:16.730019276Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.730223 env[1822]: time="2024-12-13T14:15:16.730056406Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.730223 env[1822]: time="2024-12-13T14:15:16.730089774Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.730223 env[1822]: time="2024-12-13T14:15:16.730126479Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:15:16.730454 env[1822]: time="2024-12-13T14:15:16.730415280Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:15:16.730663 env[1822]: time="2024-12-13T14:15:16.730618961Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:15:16.731325 env[1822]: time="2024-12-13T14:15:16.731253726Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:15:16.731457 env[1822]: time="2024-12-13T14:15:16.731369084Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731457 env[1822]: time="2024-12-13T14:15:16.731404321Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:15:16.731567 env[1822]: time="2024-12-13T14:15:16.731520662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731692 env[1822]: time="2024-12-13T14:15:16.731555353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731761 env[1822]: time="2024-12-13T14:15:16.731699371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731761 env[1822]: time="2024-12-13T14:15:16.731732242Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731877 env[1822]: time="2024-12-13T14:15:16.731763402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731877 env[1822]: time="2024-12-13T14:15:16.731795108Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731877 env[1822]: time="2024-12-13T14:15:16.731826778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.731877 env[1822]: time="2024-12-13T14:15:16.731858132Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.732088 env[1822]: time="2024-12-13T14:15:16.731892313Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:15:16.732213 env[1822]: time="2024-12-13T14:15:16.732170060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.732281 env[1822]: time="2024-12-13T14:15:16.732217322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.732281 env[1822]: time="2024-12-13T14:15:16.732250278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.732401 env[1822]: time="2024-12-13T14:15:16.732280006Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:15:16.732401 env[1822]: time="2024-12-13T14:15:16.732312622Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:15:16.732401 env[1822]: time="2024-12-13T14:15:16.732340809Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:15:16.732575 env[1822]: time="2024-12-13T14:15:16.732398822Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:15:16.732575 env[1822]: time="2024-12-13T14:15:16.732464612Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:15:16.732996 env[1822]: time="2024-12-13T14:15:16.732864694Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:15:16.734154 env[1822]: time="2024-12-13T14:15:16.732996954Z" level=info msg="Connect containerd service" Dec 13 14:15:16.734154 env[1822]: time="2024-12-13T14:15:16.733060694Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:15:16.743468 env[1822]: time="2024-12-13T14:15:16.743378872Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:15:16.743948 env[1822]: time="2024-12-13T14:15:16.743876074Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:15:16.744055 env[1822]: time="2024-12-13T14:15:16.743987913Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:15:16.744215 systemd[1]: Started containerd.service. Dec 13 14:15:16.747458 env[1822]: time="2024-12-13T14:15:16.747398702Z" level=info msg="containerd successfully booted in 0.312602s" Dec 13 14:15:16.749393 env[1822]: time="2024-12-13T14:15:16.748727712Z" level=info msg="Start subscribing containerd event" Dec 13 14:15:16.749393 env[1822]: time="2024-12-13T14:15:16.748844453Z" level=info msg="Start recovering state" Dec 13 14:15:16.749393 env[1822]: time="2024-12-13T14:15:16.749110151Z" level=info msg="Start event monitor" Dec 13 14:15:16.749393 env[1822]: time="2024-12-13T14:15:16.749186158Z" level=info msg="Start snapshots syncer" Dec 13 14:15:16.749393 env[1822]: time="2024-12-13T14:15:16.749216372Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:15:16.749393 env[1822]: time="2024-12-13T14:15:16.749251354Z" level=info msg="Start streaming server" Dec 13 14:15:16.894334 coreos-metadata[1798]: Dec 13 14:15:16.893 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:15:16.895282 coreos-metadata[1798]: Dec 13 14:15:16.895 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:15:16.896056 coreos-metadata[1798]: Dec 13 14:15:16.896 INFO Fetch successful Dec 13 14:15:16.896056 coreos-metadata[1798]: Dec 13 14:15:16.896 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:15:16.897461 coreos-metadata[1798]: Dec 13 14:15:16.897 INFO Fetch successful Dec 13 14:15:16.901840 unknown[1798]: wrote ssh authorized keys file for user: core Dec 13 14:15:16.940313 update-ssh-keys[1946]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:16.941327 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:15:17.009858 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Create new startup processor Dec 13 14:15:17.014508 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:15:17.022220 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Initializing bookkeeping folders Dec 13 14:15:17.022469 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO removing the completed state files Dec 13 14:15:17.022601 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:15:17.022745 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:15:17.022889 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Initializing healthcheck folders for long running plugins Dec 13 14:15:17.023105 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Initializing locations for inventory plugin Dec 13 14:15:17.023482 amazon-ssm-agent[1796]: 2024-12-13 14:15:16 INFO Initializing default location for custom inventory Dec 13 14:15:17.023849 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO Initializing default location for file inventory Dec 13 14:15:17.024064 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO Initializing default location for role inventory Dec 13 14:15:17.024372 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO Init the cloudwatchlogs publisher Dec 13 14:15:17.024698 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:15:17.024847 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:15:17.025140 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:15:17.025286 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:15:17.025484 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:15:17.026537 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:15:17.026748 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:15:17.026934 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:15:17.027059 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:15:17.027194 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:15:17.027328 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:15:17.027526 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO OS: linux, Arch: arm64 Dec 13 14:15:17.028739 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:15:17.034568 amazon-ssm-agent[1796]: datastore file /var/lib/amazon/ssm/i-05b5e06a3b2c3c9da/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:15:17.146209 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:15:17.241048 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:15:17.335609 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-05b5e06a3b2c3c9da, requestId: 23d61b77-3848-41dc-8bc2-5ee8a8f1b25d Dec 13 14:15:17.430407 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:15:17.525258 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:15:17.595853 locksmithd[1868]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:15:17.620432 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:15:17.715776 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:15:17.811213 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:15:17.873008 systemd[1]: Started kubelet.service. Dec 13 14:15:17.906911 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [instanceID=i-05b5e06a3b2c3c9da] Starting association polling Dec 13 14:15:18.002924 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:15:18.098953 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:15:18.195251 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:15:18.291813 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [OfflineService] Starting document processing engine... Dec 13 14:15:18.388462 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:15:18.485376 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:15:18.582576 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:15:18.679784 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:15:18.725643 kubelet[2001]: E1213 14:15:18.725545 2001 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:15:18.729789 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:15:18.730108 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:15:18.730605 systemd[1]: kubelet.service: Consumed 1.473s CPU time. Dec 13 14:15:18.777278 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] listening reply. Dec 13 14:15:18.875219 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:15:18.973318 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [OfflineService] Starting message polling Dec 13 14:15:19.071436 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [OfflineService] Starting send replies to MDS Dec 13 14:15:19.169901 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:15:19.268315 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:15:19.367072 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:15:19.466027 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:15:19.564987 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:15:19.664211 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:15:19.763787 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:15:19.863686 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-05b5e06a3b2c3c9da?role=subscribe&stream=input Dec 13 14:15:19.963586 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-05b5e06a3b2c3c9da?role=subscribe&stream=input Dec 13 14:15:20.063884 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:15:20.164043 amazon-ssm-agent[1796]: 2024-12-13 14:15:17 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:15:23.439898 sshd_keygen[1824]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:15:23.477950 systemd[1]: Finished sshd-keygen.service. Dec 13 14:15:23.482703 systemd[1]: Starting issuegen.service... Dec 13 14:15:23.493114 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:15:23.493518 systemd[1]: Finished issuegen.service. Dec 13 14:15:23.498012 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:15:23.512112 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:15:23.516807 systemd[1]: Started getty@tty1.service. Dec 13 14:15:23.521112 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:15:23.523187 systemd[1]: Reached target getty.target. Dec 13 14:15:23.524888 systemd[1]: Reached target multi-user.target. Dec 13 14:15:23.529187 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:15:23.544646 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:15:23.545043 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:15:23.547084 systemd[1]: Startup finished in 1.119s (kernel) + 8.611s (initrd) + 17.344s (userspace) = 27.075s. Dec 13 14:15:24.243541 systemd[1]: Created slice system-sshd.slice. Dec 13 14:15:24.245931 systemd[1]: Started sshd@0-172.31.29.32:22-139.178.89.65:55428.service. Dec 13 14:15:24.484908 sshd[2022]: Accepted publickey for core from 139.178.89.65 port 55428 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:24.489031 sshd[2022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:24.507403 systemd[1]: Created slice user-500.slice. Dec 13 14:15:24.510623 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:15:24.518511 systemd-logind[1809]: New session 1 of user core. Dec 13 14:15:24.533643 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:15:24.538282 systemd[1]: Starting user@500.service... Dec 13 14:15:24.544846 (systemd)[2025]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:24.752486 systemd[2025]: Queued start job for default target default.target. Dec 13 14:15:24.753517 systemd[2025]: Reached target paths.target. Dec 13 14:15:24.753568 systemd[2025]: Reached target sockets.target. Dec 13 14:15:24.753600 systemd[2025]: Reached target timers.target. Dec 13 14:15:24.753630 systemd[2025]: Reached target basic.target. Dec 13 14:15:24.753733 systemd[2025]: Reached target default.target. Dec 13 14:15:24.753799 systemd[2025]: Startup finished in 196ms. Dec 13 14:15:24.754497 systemd[1]: Started user@500.service. Dec 13 14:15:24.756549 systemd[1]: Started session-1.scope. Dec 13 14:15:24.908566 systemd[1]: Started sshd@1-172.31.29.32:22-139.178.89.65:55432.service. Dec 13 14:15:25.077730 sshd[2034]: Accepted publickey for core from 139.178.89.65 port 55432 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:25.080249 sshd[2034]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:25.088312 systemd-logind[1809]: New session 2 of user core. Dec 13 14:15:25.089242 systemd[1]: Started session-2.scope. Dec 13 14:15:25.220053 sshd[2034]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:25.225538 systemd[1]: sshd@1-172.31.29.32:22-139.178.89.65:55432.service: Deactivated successfully. Dec 13 14:15:25.226843 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:15:25.228016 systemd-logind[1809]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:15:25.229887 systemd-logind[1809]: Removed session 2. Dec 13 14:15:25.249809 systemd[1]: Started sshd@2-172.31.29.32:22-139.178.89.65:55438.service. Dec 13 14:15:25.422505 sshd[2040]: Accepted publickey for core from 139.178.89.65 port 55438 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:25.425507 sshd[2040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:25.434013 systemd[1]: Started session-3.scope. Dec 13 14:15:25.435012 systemd-logind[1809]: New session 3 of user core. Dec 13 14:15:25.557798 sshd[2040]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:25.564056 systemd[1]: sshd@2-172.31.29.32:22-139.178.89.65:55438.service: Deactivated successfully. Dec 13 14:15:25.565303 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:15:25.565401 systemd-logind[1809]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:15:25.567643 systemd-logind[1809]: Removed session 3. Dec 13 14:15:25.586845 systemd[1]: Started sshd@3-172.31.29.32:22-139.178.89.65:55444.service. Dec 13 14:15:25.759108 sshd[2046]: Accepted publickey for core from 139.178.89.65 port 55444 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:25.762110 sshd[2046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:25.769696 systemd-logind[1809]: New session 4 of user core. Dec 13 14:15:25.770545 systemd[1]: Started session-4.scope. Dec 13 14:15:25.900988 sshd[2046]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:25.906455 systemd-logind[1809]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:15:25.907591 systemd[1]: sshd@3-172.31.29.32:22-139.178.89.65:55444.service: Deactivated successfully. Dec 13 14:15:25.908821 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:15:25.910133 systemd-logind[1809]: Removed session 4. Dec 13 14:15:25.929142 systemd[1]: Started sshd@4-172.31.29.32:22-139.178.89.65:55456.service. Dec 13 14:15:26.104470 sshd[2052]: Accepted publickey for core from 139.178.89.65 port 55456 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:26.107395 sshd[2052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:26.115523 systemd[1]: Started session-5.scope. Dec 13 14:15:26.116477 systemd-logind[1809]: New session 5 of user core. Dec 13 14:15:26.279215 sudo[2055]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:15:26.280261 sudo[2055]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:26.318589 dbus-daemon[1799]: avc: received setenforce notice (enforcing=1) Dec 13 14:15:26.321407 sudo[2055]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:26.346166 sshd[2052]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:26.351543 systemd[1]: sshd@4-172.31.29.32:22-139.178.89.65:55456.service: Deactivated successfully. Dec 13 14:15:26.352925 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:15:26.354173 systemd-logind[1809]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:15:26.356174 systemd-logind[1809]: Removed session 5. Dec 13 14:15:26.376709 systemd[1]: Started sshd@5-172.31.29.32:22-139.178.89.65:55466.service. Dec 13 14:15:26.549513 sshd[2059]: Accepted publickey for core from 139.178.89.65 port 55466 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:26.552227 sshd[2059]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:26.560580 systemd-logind[1809]: New session 6 of user core. Dec 13 14:15:26.560985 systemd[1]: Started session-6.scope. Dec 13 14:15:26.668946 sudo[2063]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:15:26.669979 sudo[2063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:26.675769 sudo[2063]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:26.686469 sudo[2062]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:15:26.687501 sudo[2062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:26.705084 systemd[1]: Stopping audit-rules.service... Dec 13 14:15:26.706000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:26.709073 kernel: kauditd_printk_skb: 107 callbacks suppressed Dec 13 14:15:26.709164 kernel: audit: type=1305 audit(1734099326.706:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:26.706000 audit[2066]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe6e4de0 a2=420 a3=0 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:26.714604 auditctl[2066]: No rules Dec 13 14:15:26.715498 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:15:26.715832 systemd[1]: Stopped audit-rules.service. Dec 13 14:15:26.725753 kernel: audit: type=1300 audit(1734099326.706:201): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe6e4de0 a2=420 a3=0 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:26.725854 kernel: audit: type=1327 audit(1734099326.706:201): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:26.706000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:26.726973 systemd[1]: Starting audit-rules.service... Dec 13 14:15:26.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.737034 kernel: audit: type=1131 audit(1734099326.713:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.762683 augenrules[2083]: No rules Dec 13 14:15:26.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.763813 systemd[1]: Finished audit-rules.service. Dec 13 14:15:26.771000 audit[2062]: USER_END pid=2062 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.773103 sudo[2062]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:26.781688 kernel: audit: type=1130 audit(1734099326.762:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.781756 kernel: audit: type=1106 audit(1734099326.771:204): pid=2062 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.772000 audit[2062]: CRED_DISP pid=2062 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.789897 kernel: audit: type=1104 audit(1734099326.772:205): pid=2062 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.804728 sshd[2059]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:26.807000 audit[2059]: USER_END pid=2059 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:26.807000 audit[2059]: CRED_DISP pid=2059 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:26.820282 systemd[1]: sshd@5-172.31.29.32:22-139.178.89.65:55466.service: Deactivated successfully. Dec 13 14:15:26.821487 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:15:26.828322 kernel: audit: type=1106 audit(1734099326.807:206): pid=2059 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:26.828401 kernel: audit: type=1104 audit(1734099326.807:207): pid=2059 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:26.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.32:22-139.178.89.65:55466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.829324 systemd-logind[1809]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:15:26.840219 kernel: audit: type=1131 audit(1734099326.818:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.32:22-139.178.89.65:55466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:26.844643 systemd-logind[1809]: Removed session 6. Dec 13 14:15:26.846902 systemd[1]: Started sshd@6-172.31.29.32:22-139.178.89.65:55472.service. Dec 13 14:15:26.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.32:22-139.178.89.65:55472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.022000 audit[2089]: USER_ACCT pid=2089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:27.023064 sshd[2089]: Accepted publickey for core from 139.178.89.65 port 55472 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:27.025000 audit[2089]: CRED_ACQ pid=2089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:27.025000 audit[2089]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe368c3b0 a2=3 a3=1 items=0 ppid=1 pid=2089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:27.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:27.026749 sshd[2089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:27.035806 systemd[1]: Started session-7.scope. Dec 13 14:15:27.036796 systemd-logind[1809]: New session 7 of user core. Dec 13 14:15:27.045000 audit[2089]: USER_START pid=2089 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:27.047000 audit[2091]: CRED_ACQ pid=2091 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:27.142000 audit[2092]: USER_ACCT pid=2092 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.144359 sudo[2092]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:15:27.143000 audit[2092]: CRED_REFR pid=2092 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.145692 sudo[2092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:27.148000 audit[2092]: USER_START pid=2092 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.170377 systemd[1]: Starting coreos-metadata.service... Dec 13 14:15:27.330842 coreos-metadata[2096]: Dec 13 14:15:27.330 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:15:27.331828 coreos-metadata[2096]: Dec 13 14:15:27.331 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Dec 13 14:15:27.332497 coreos-metadata[2096]: Dec 13 14:15:27.332 INFO Fetch successful Dec 13 14:15:27.332947 coreos-metadata[2096]: Dec 13 14:15:27.332 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Dec 13 14:15:27.333224 coreos-metadata[2096]: Dec 13 14:15:27.333 INFO Fetch successful Dec 13 14:15:27.333503 coreos-metadata[2096]: Dec 13 14:15:27.333 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Dec 13 14:15:27.333845 coreos-metadata[2096]: Dec 13 14:15:27.333 INFO Fetch successful Dec 13 14:15:27.334127 coreos-metadata[2096]: Dec 13 14:15:27.333 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Dec 13 14:15:27.334499 coreos-metadata[2096]: Dec 13 14:15:27.334 INFO Fetch successful Dec 13 14:15:27.334792 coreos-metadata[2096]: Dec 13 14:15:27.334 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Dec 13 14:15:27.335053 coreos-metadata[2096]: Dec 13 14:15:27.334 INFO Fetch successful Dec 13 14:15:27.335307 coreos-metadata[2096]: Dec 13 14:15:27.335 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Dec 13 14:15:27.335605 coreos-metadata[2096]: Dec 13 14:15:27.335 INFO Fetch successful Dec 13 14:15:27.335855 coreos-metadata[2096]: Dec 13 14:15:27.335 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Dec 13 14:15:27.336515 coreos-metadata[2096]: Dec 13 14:15:27.336 INFO Fetch successful Dec 13 14:15:27.336780 coreos-metadata[2096]: Dec 13 14:15:27.336 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Dec 13 14:15:27.337067 coreos-metadata[2096]: Dec 13 14:15:27.336 INFO Fetch successful Dec 13 14:15:27.350650 systemd[1]: Finished coreos-metadata.service. Dec 13 14:15:27.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.924528 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:28.924991 systemd[1]: Stopped kubelet.service. Dec 13 14:15:28.925083 systemd[1]: kubelet.service: Consumed 1.473s CPU time. Dec 13 14:15:28.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.927936 systemd[1]: Starting kubelet.service... Dec 13 14:15:29.117090 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:15:29.117280 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:15:29.117869 systemd[1]: Stopped kubelet.service. Dec 13 14:15:29.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:15:29.122756 systemd[1]: Starting kubelet.service... Dec 13 14:15:29.159594 systemd[1]: Reloading. Dec 13 14:15:29.293187 /usr/lib/systemd/system-generators/torcx-generator[2158]: time="2024-12-13T14:15:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:29.310331 /usr/lib/systemd/system-generators/torcx-generator[2158]: time="2024-12-13T14:15:29Z" level=info msg="torcx already run" Dec 13 14:15:29.486097 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:29.486135 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:29.526092 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit: BPF prog-id=46 op=LOAD Dec 13 14:15:29.690000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.690000 audit: BPF prog-id=47 op=LOAD Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.691000 audit: BPF prog-id=48 op=LOAD Dec 13 14:15:29.691000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:15:29.691000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.693000 audit: BPF prog-id=49 op=LOAD Dec 13 14:15:29.693000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.698000 audit: BPF prog-id=50 op=LOAD Dec 13 14:15:29.698000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.702000 audit: BPF prog-id=51 op=LOAD Dec 13 14:15:29.702000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit: BPF prog-id=52 op=LOAD Dec 13 14:15:29.704000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.704000 audit: BPF prog-id=53 op=LOAD Dec 13 14:15:29.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.705000 audit: BPF prog-id=54 op=LOAD Dec 13 14:15:29.705000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:15:29.705000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.707000 audit: BPF prog-id=55 op=LOAD Dec 13 14:15:29.707000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:15:29.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit: BPF prog-id=56 op=LOAD Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.708000 audit: BPF prog-id=57 op=LOAD Dec 13 14:15:29.708000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:15:29.708000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.710000 audit: BPF prog-id=58 op=LOAD Dec 13 14:15:29.710000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit: BPF prog-id=59 op=LOAD Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.711000 audit: BPF prog-id=60 op=LOAD Dec 13 14:15:29.711000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:15:29.711000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit: BPF prog-id=61 op=LOAD Dec 13 14:15:29.713000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit: BPF prog-id=62 op=LOAD Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:29.714000 audit: BPF prog-id=63 op=LOAD Dec 13 14:15:29.714000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:15:29.714000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:15:29.750126 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:15:29.750315 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:15:29.750840 systemd[1]: Stopped kubelet.service. Dec 13 14:15:29.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:15:29.754120 systemd[1]: Starting kubelet.service... Dec 13 14:15:30.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.421437 systemd[1]: Started kubelet.service. Dec 13 14:15:30.512819 kubelet[2217]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:15:30.512819 kubelet[2217]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:15:30.512819 kubelet[2217]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:15:30.513467 kubelet[2217]: I1213 14:15:30.512933 2217 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:15:32.513444 kubelet[2217]: I1213 14:15:32.513385 2217 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:15:32.513444 kubelet[2217]: I1213 14:15:32.513440 2217 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:15:32.514178 kubelet[2217]: I1213 14:15:32.513781 2217 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:15:32.578096 kubelet[2217]: I1213 14:15:32.578031 2217 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:15:32.600224 kubelet[2217]: I1213 14:15:32.600167 2217 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:15:32.600737 kubelet[2217]: I1213 14:15:32.600673 2217 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:15:32.601042 kubelet[2217]: I1213 14:15:32.600994 2217 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:15:32.601042 kubelet[2217]: I1213 14:15:32.601039 2217 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:15:32.601282 kubelet[2217]: I1213 14:15:32.601063 2217 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:15:32.601282 kubelet[2217]: I1213 14:15:32.601262 2217 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:15:32.606368 kubelet[2217]: I1213 14:15:32.606314 2217 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:15:32.606368 kubelet[2217]: I1213 14:15:32.606387 2217 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:15:32.606645 kubelet[2217]: I1213 14:15:32.606430 2217 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:15:32.606645 kubelet[2217]: I1213 14:15:32.606461 2217 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:15:32.607498 kubelet[2217]: E1213 14:15:32.607321 2217 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:32.607935 kubelet[2217]: E1213 14:15:32.607907 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:32.608832 kubelet[2217]: I1213 14:15:32.608802 2217 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:15:32.609592 kubelet[2217]: I1213 14:15:32.609567 2217 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:15:32.609954 kubelet[2217]: W1213 14:15:32.609934 2217 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:15:32.611745 kubelet[2217]: I1213 14:15:32.611713 2217 server.go:1256] "Started kubelet" Dec 13 14:15:32.613453 kubelet[2217]: I1213 14:15:32.613411 2217 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:15:32.614888 kubelet[2217]: I1213 14:15:32.614841 2217 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:15:32.617410 kubelet[2217]: I1213 14:15:32.617322 2217 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:15:32.618037 kubelet[2217]: I1213 14:15:32.618005 2217 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:15:32.618000 audit[2217]: AVC avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:32.620182 kubelet[2217]: I1213 14:15:32.619686 2217 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:15:32.620182 kubelet[2217]: I1213 14:15:32.619753 2217 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:15:32.621551 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 14:15:32.621738 kernel: audit: type=1400 audit(1734099332.618:430): avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:32.625436 kubelet[2217]: I1213 14:15:32.625398 2217 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:15:32.618000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:32.632738 kernel: audit: type=1401 audit(1734099332.618:430): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:32.632892 kernel: audit: type=1300 audit(1734099332.618:430): arch=c00000b7 syscall=5 success=no exit=-22 a0=400095a9c0 a1=400096c288 a2=400095a990 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.618000 audit[2217]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400095a9c0 a1=400096c288 a2=400095a990 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.636617 kubelet[2217]: E1213 14:15:32.636580 2217 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.29.32.1810c227c58fa724 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.29.32,UID:172.31.29.32,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.29.32,},FirstTimestamp:2024-12-13 14:15:32.611680036 +0000 UTC m=+2.180946771,LastTimestamp:2024-12-13 14:15:32.611680036 +0000 UTC m=+2.180946771,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.29.32,}" Dec 13 14:15:32.637738 kubelet[2217]: E1213 14:15:32.637710 2217 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:15:32.642500 kubelet[2217]: I1213 14:15:32.642467 2217 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:15:32.643159 kubelet[2217]: I1213 14:15:32.643134 2217 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:15:32.618000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:32.646541 kubelet[2217]: I1213 14:15:32.646487 2217 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:15:32.652199 kubelet[2217]: I1213 14:15:32.649521 2217 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:15:32.652611 kubelet[2217]: I1213 14:15:32.652557 2217 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:15:32.653999 kubelet[2217]: W1213 14:15:32.653947 2217 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "172.31.29.32" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:15:32.654400 kubelet[2217]: E1213 14:15:32.654377 2217 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.29.32" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:15:32.655146 kernel: audit: type=1327 audit(1734099332.618:430): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:32.618000 audit[2217]: AVC avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:32.661192 kubelet[2217]: I1213 14:15:32.661138 2217 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:15:32.663501 kernel: audit: type=1400 audit(1734099332.618:431): avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:32.618000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:32.670224 kernel: audit: type=1401 audit(1734099332.618:431): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:32.618000 audit[2217]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004ba5a0 a1=400096c2a0 a2=400095aa50 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.681224 kernel: audit: type=1300 audit(1734099332.618:431): arch=c00000b7 syscall=5 success=no exit=-22 a0=40004ba5a0 a1=400096c2a0 a2=400095aa50 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.618000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:32.693313 kernel: audit: type=1327 audit(1734099332.618:431): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:32.694981 kubelet[2217]: I1213 14:15:32.694950 2217 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:15:32.695182 kubelet[2217]: I1213 14:15:32.695161 2217 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:15:32.695304 kubelet[2217]: I1213 14:15:32.695284 2217 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:15:32.696982 kubelet[2217]: E1213 14:15:32.696950 2217 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.29.32\" not found" node="172.31.29.32" Dec 13 14:15:32.698647 kubelet[2217]: I1213 14:15:32.698611 2217 policy_none.go:49] "None policy: Start" Dec 13 14:15:32.701272 kubelet[2217]: I1213 14:15:32.701237 2217 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:15:32.701568 kubelet[2217]: I1213 14:15:32.701543 2217 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:15:32.711678 systemd[1]: Created slice kubepods.slice. Dec 13 14:15:32.728679 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:15:32.735860 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:15:32.745206 kubelet[2217]: I1213 14:15:32.745170 2217 kubelet_node_status.go:73] "Attempting to register node" node="172.31.29.32" Dec 13 14:15:32.749478 kubelet[2217]: I1213 14:15:32.749424 2217 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:15:32.750000 audit[2217]: AVC avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:32.759371 kernel: audit: type=1400 audit(1734099332.750:432): avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:32.759670 kubelet[2217]: I1213 14:15:32.759640 2217 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:15:32.750000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:32.766765 kernel: audit: type=1401 audit(1734099332.750:432): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:32.750000 audit[2217]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000eacc00 a1=4000e95fb0 a2=4000eacbd0 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:32.769133 kubelet[2217]: I1213 14:15:32.768115 2217 kubelet_node_status.go:76] "Successfully registered node" node="172.31.29.32" Dec 13 14:15:32.769868 kubelet[2217]: I1213 14:15:32.769835 2217 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:15:32.770000 audit[2233]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.770000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb046420 a2=0 a3=1 items=0 ppid=2217 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:15:32.773413 kubelet[2217]: E1213 14:15:32.772751 2217 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.29.32\" not found" Dec 13 14:15:32.775000 audit[2235]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.775000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffeb970740 a2=0 a3=1 items=0 ppid=2217 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:15:32.780000 audit[2237]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.780000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffec48f970 a2=0 a3=1 items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:32.809000 audit[2242]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.809000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd6077210 a2=0 a3=1 items=0 ppid=2217 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:32.824872 kubelet[2217]: E1213 14:15:32.824829 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:32.925496 kubelet[2217]: E1213 14:15:32.925418 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:32.964000 audit[2247]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.964000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd0c0e9e0 a2=0 a3=1 items=0 ppid=2217 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:15:32.966869 kubelet[2217]: I1213 14:15:32.966818 2217 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:15:32.967000 audit[2249]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.967000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffdbddb70 a2=0 a3=1 items=0 ppid=2217 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.967000 audit[2248]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:32.967000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeeb84dd0 a2=0 a3=1 items=0 ppid=2217 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:15:32.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:15:32.969548 kubelet[2217]: I1213 14:15:32.969504 2217 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:15:32.969668 kubelet[2217]: I1213 14:15:32.969558 2217 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:15:32.969668 kubelet[2217]: I1213 14:15:32.969592 2217 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:15:32.969789 kubelet[2217]: E1213 14:15:32.969747 2217 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:15:32.970000 audit[2250]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:32.970000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb429460 a2=0 a3=1 items=0 ppid=2217 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:15:32.972000 audit[2251]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.972000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc31de640 a2=0 a3=1 items=0 ppid=2217 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:15:32.974000 audit[2252]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:32.974000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe07eb300 a2=0 a3=1 items=0 ppid=2217 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:15:32.975000 audit[2253]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:32.975000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc85ed00 a2=0 a3=1 items=0 ppid=2217 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:15:32.977000 audit[2254]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:32.977000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe22ecf60 a2=0 a3=1 items=0 ppid=2217 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:32.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:15:33.027128 kubelet[2217]: E1213 14:15:33.026400 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:33.127559 kubelet[2217]: E1213 14:15:33.127508 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:33.228618 kubelet[2217]: E1213 14:15:33.228560 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:33.329640 kubelet[2217]: E1213 14:15:33.329500 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:33.430541 kubelet[2217]: E1213 14:15:33.430498 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:33.517272 kubelet[2217]: I1213 14:15:33.517222 2217 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:15:33.518122 kubelet[2217]: W1213 14:15:33.518071 2217 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:15:33.518122 kubelet[2217]: W1213 14:15:33.518071 2217 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:15:33.531507 kubelet[2217]: E1213 14:15:33.531452 2217 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.29.32\" not found" Dec 13 14:15:33.608816 kubelet[2217]: I1213 14:15:33.608667 2217 apiserver.go:52] "Watching apiserver" Dec 13 14:15:33.609251 kubelet[2217]: E1213 14:15:33.609208 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:33.625428 kubelet[2217]: I1213 14:15:33.625364 2217 topology_manager.go:215] "Topology Admit Handler" podUID="7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca" podNamespace="calico-system" podName="calico-node-8wxdn" Dec 13 14:15:33.625592 kubelet[2217]: I1213 14:15:33.625539 2217 topology_manager.go:215] "Topology Admit Handler" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" podNamespace="calico-system" podName="csi-node-driver-lwc7q" Dec 13 14:15:33.625690 kubelet[2217]: I1213 14:15:33.625656 2217 topology_manager.go:215] "Topology Admit Handler" podUID="028826f2-bb8e-43fc-bfb6-2f3a765c118b" podNamespace="kube-system" podName="kube-proxy-wrdkt" Dec 13 14:15:33.627249 kubelet[2217]: E1213 14:15:33.627190 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:33.633253 kubelet[2217]: I1213 14:15:33.633217 2217 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:15:33.637689 systemd[1]: Created slice kubepods-besteffort-pod028826f2_bb8e_43fc_bfb6_2f3a765c118b.slice. Dec 13 14:15:33.639400 env[1822]: time="2024-12-13T14:15:33.636014743Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:15:33.641669 kubelet[2217]: I1213 14:15:33.641397 2217 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:15:33.645310 kubelet[2217]: I1213 14:15:33.645251 2217 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:15:33.654010 systemd[1]: Created slice kubepods-besteffort-pod7db4b7db_58e9_42e9_aa6d_11c1cc8a5cca.slice. Dec 13 14:15:33.664304 kubelet[2217]: I1213 14:15:33.664247 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1325b8d0-8bdd-42ab-a504-b3b56836607d-kubelet-dir\") pod \"csi-node-driver-lwc7q\" (UID: \"1325b8d0-8bdd-42ab-a504-b3b56836607d\") " pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:33.664492 kubelet[2217]: I1213 14:15:33.664321 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/028826f2-bb8e-43fc-bfb6-2f3a765c118b-kube-proxy\") pod \"kube-proxy-wrdkt\" (UID: \"028826f2-bb8e-43fc-bfb6-2f3a765c118b\") " pod="kube-system/kube-proxy-wrdkt" Dec 13 14:15:33.664492 kubelet[2217]: I1213 14:15:33.664401 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-lib-modules\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664492 kubelet[2217]: I1213 14:15:33.664451 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-tigera-ca-bundle\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664684 kubelet[2217]: I1213 14:15:33.664497 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-node-certs\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664684 kubelet[2217]: I1213 14:15:33.664541 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-var-run-calico\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664684 kubelet[2217]: I1213 14:15:33.664599 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-cni-net-dir\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664684 kubelet[2217]: I1213 14:15:33.664642 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1325b8d0-8bdd-42ab-a504-b3b56836607d-varrun\") pod \"csi-node-driver-lwc7q\" (UID: \"1325b8d0-8bdd-42ab-a504-b3b56836607d\") " pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:33.664914 kubelet[2217]: I1213 14:15:33.664687 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-cni-bin-dir\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664914 kubelet[2217]: I1213 14:15:33.664735 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-cni-log-dir\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.664914 kubelet[2217]: I1213 14:15:33.664780 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1325b8d0-8bdd-42ab-a504-b3b56836607d-socket-dir\") pod \"csi-node-driver-lwc7q\" (UID: \"1325b8d0-8bdd-42ab-a504-b3b56836607d\") " pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:33.664914 kubelet[2217]: I1213 14:15:33.664827 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kz9wt\" (UniqueName: \"kubernetes.io/projected/1325b8d0-8bdd-42ab-a504-b3b56836607d-kube-api-access-kz9wt\") pod \"csi-node-driver-lwc7q\" (UID: \"1325b8d0-8bdd-42ab-a504-b3b56836607d\") " pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:33.664914 kubelet[2217]: I1213 14:15:33.664885 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/028826f2-bb8e-43fc-bfb6-2f3a765c118b-lib-modules\") pod \"kube-proxy-wrdkt\" (UID: \"028826f2-bb8e-43fc-bfb6-2f3a765c118b\") " pod="kube-system/kube-proxy-wrdkt" Dec 13 14:15:33.665252 kubelet[2217]: I1213 14:15:33.664932 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-xtables-lock\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.665252 kubelet[2217]: I1213 14:15:33.664976 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-var-lib-calico\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.665252 kubelet[2217]: I1213 14:15:33.665030 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1325b8d0-8bdd-42ab-a504-b3b56836607d-registration-dir\") pod \"csi-node-driver-lwc7q\" (UID: \"1325b8d0-8bdd-42ab-a504-b3b56836607d\") " pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:33.665252 kubelet[2217]: I1213 14:15:33.665082 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hnwrm\" (UniqueName: \"kubernetes.io/projected/028826f2-bb8e-43fc-bfb6-2f3a765c118b-kube-api-access-hnwrm\") pod \"kube-proxy-wrdkt\" (UID: \"028826f2-bb8e-43fc-bfb6-2f3a765c118b\") " pod="kube-system/kube-proxy-wrdkt" Dec 13 14:15:33.665252 kubelet[2217]: I1213 14:15:33.665148 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-policysync\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.665705 kubelet[2217]: I1213 14:15:33.665196 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-flexvol-driver-host\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.665705 kubelet[2217]: I1213 14:15:33.665246 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2j6d\" (UniqueName: \"kubernetes.io/projected/7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca-kube-api-access-w2j6d\") pod \"calico-node-8wxdn\" (UID: \"7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca\") " pod="calico-system/calico-node-8wxdn" Dec 13 14:15:33.665705 kubelet[2217]: I1213 14:15:33.665289 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/028826f2-bb8e-43fc-bfb6-2f3a765c118b-xtables-lock\") pod \"kube-proxy-wrdkt\" (UID: \"028826f2-bb8e-43fc-bfb6-2f3a765c118b\") " pod="kube-system/kube-proxy-wrdkt" Dec 13 14:15:33.782934 kubelet[2217]: E1213 14:15:33.782898 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:33.783124 kubelet[2217]: W1213 14:15:33.783096 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:33.783280 kubelet[2217]: E1213 14:15:33.783256 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:33.843408 kubelet[2217]: E1213 14:15:33.843370 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:33.843639 kubelet[2217]: W1213 14:15:33.843611 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:33.843829 kubelet[2217]: E1213 14:15:33.843794 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:33.844428 kubelet[2217]: E1213 14:15:33.844395 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:33.844428 kubelet[2217]: W1213 14:15:33.844427 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:33.844625 kubelet[2217]: E1213 14:15:33.844461 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:33.854240 kubelet[2217]: E1213 14:15:33.854208 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:33.854523 kubelet[2217]: W1213 14:15:33.854493 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:33.854663 kubelet[2217]: E1213 14:15:33.854639 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:33.955732 env[1822]: time="2024-12-13T14:15:33.953399754Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wrdkt,Uid:028826f2-bb8e-43fc-bfb6-2f3a765c118b,Namespace:kube-system,Attempt:0,}" Dec 13 14:15:33.963594 env[1822]: time="2024-12-13T14:15:33.963518820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8wxdn,Uid:7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:33.975620 sudo[2092]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:33.975000 audit[2092]: USER_END pid=2092 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:33.975000 audit[2092]: CRED_DISP pid=2092 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:34.000569 sshd[2089]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:34.002000 audit[2089]: USER_END pid=2089 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.002000 audit[2089]: CRED_DISP pid=2089 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.32:22-139.178.89.65:55472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:34.006328 systemd[1]: sshd@6-172.31.29.32:22-139.178.89.65:55472.service: Deactivated successfully. Dec 13 14:15:34.007744 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:15:34.010992 systemd-logind[1809]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:15:34.012800 systemd-logind[1809]: Removed session 7. Dec 13 14:15:34.561673 env[1822]: time="2024-12-13T14:15:34.561612879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.566784 env[1822]: time="2024-12-13T14:15:34.566710518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.569311 env[1822]: time="2024-12-13T14:15:34.569263861Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.572832 env[1822]: time="2024-12-13T14:15:34.572767469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.575126 env[1822]: time="2024-12-13T14:15:34.575077494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.577898 env[1822]: time="2024-12-13T14:15:34.577600638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.582834 env[1822]: time="2024-12-13T14:15:34.582779744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.589742 env[1822]: time="2024-12-13T14:15:34.589679897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:34.610449 kubelet[2217]: E1213 14:15:34.610390 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:34.633945 env[1822]: time="2024-12-13T14:15:34.633819361Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:34.634258 env[1822]: time="2024-12-13T14:15:34.634203063Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:34.634477 env[1822]: time="2024-12-13T14:15:34.634428146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:34.634892 env[1822]: time="2024-12-13T14:15:34.634829939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932 pid=2273 runtime=io.containerd.runc.v2 Dec 13 14:15:34.637520 env[1822]: time="2024-12-13T14:15:34.637321960Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:34.637661 env[1822]: time="2024-12-13T14:15:34.637575800Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:34.637804 env[1822]: time="2024-12-13T14:15:34.637690864Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:34.639124 env[1822]: time="2024-12-13T14:15:34.638995872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d3eaec567f026a0fd6a7fc04c1671fd67fa59552de8f28446a29d1dce9dc494 pid=2284 runtime=io.containerd.runc.v2 Dec 13 14:15:34.669088 systemd[1]: Started cri-containerd-1d3eaec567f026a0fd6a7fc04c1671fd67fa59552de8f28446a29d1dce9dc494.scope. Dec 13 14:15:34.679437 systemd[1]: Started cri-containerd-000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932.scope. Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.719000 audit: BPF prog-id=64 op=LOAD Dec 13 14:15:34.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.722000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2284 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336561656335363766303236613066643661376663303463313637 Dec 13 14:15:34.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.722000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2284 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336561656335363766303236613066643661376663303463313637 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.723000 audit: BPF prog-id=65 op=LOAD Dec 13 14:15:34.723000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2284 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336561656335363766303236613066643661376663303463313637 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.724000 audit: BPF prog-id=66 op=LOAD Dec 13 14:15:34.724000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2284 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336561656335363766303236613066643661376663303463313637 Dec 13 14:15:34.726000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:15:34.726000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.727000 audit: BPF prog-id=67 op=LOAD Dec 13 14:15:34.727000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2284 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164336561656335363766303236613066643661376663303463313637 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.732000 audit: BPF prog-id=68 op=LOAD Dec 13 14:15:34.734000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.734000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2273 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030306230616332393561366337613938326563663937396234306663 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2273 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030306230616332393561366337613938326563663937396234306663 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.735000 audit: BPF prog-id=69 op=LOAD Dec 13 14:15:34.735000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2273 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030306230616332393561366337613938326563663937396234306663 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.737000 audit: BPF prog-id=70 op=LOAD Dec 13 14:15:34.737000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2273 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030306230616332393561366337613938326563663937396234306663 Dec 13 14:15:34.738000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:15:34.738000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.738000 audit: BPF prog-id=71 op=LOAD Dec 13 14:15:34.738000 audit[2299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2273 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030306230616332393561366337613938326563663937396234306663 Dec 13 14:15:34.784650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4245548523.mount: Deactivated successfully. Dec 13 14:15:34.786133 env[1822]: time="2024-12-13T14:15:34.786069326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wrdkt,Uid:028826f2-bb8e-43fc-bfb6-2f3a765c118b,Namespace:kube-system,Attempt:0,} returns sandbox id \"1d3eaec567f026a0fd6a7fc04c1671fd67fa59552de8f28446a29d1dce9dc494\"" Dec 13 14:15:34.793607 env[1822]: time="2024-12-13T14:15:34.793540522Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:15:34.799532 env[1822]: time="2024-12-13T14:15:34.799472391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8wxdn,Uid:7db4b7db-58e9-42e9-aa6d-11c1cc8a5cca,Namespace:calico-system,Attempt:0,} returns sandbox id \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\"" Dec 13 14:15:35.610815 kubelet[2217]: E1213 14:15:35.610745 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:35.970975 kubelet[2217]: E1213 14:15:35.970828 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:36.412414 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount648883230.mount: Deactivated successfully. Dec 13 14:15:36.611833 kubelet[2217]: E1213 14:15:36.611747 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:37.281781 env[1822]: time="2024-12-13T14:15:37.281712247Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:37.286090 env[1822]: time="2024-12-13T14:15:37.286027627Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:37.289909 env[1822]: time="2024-12-13T14:15:37.289823824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:37.297067 env[1822]: time="2024-12-13T14:15:37.296992391Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 14:15:37.299314 env[1822]: time="2024-12-13T14:15:37.299219128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:37.301698 env[1822]: time="2024-12-13T14:15:37.301627511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:15:37.305968 env[1822]: time="2024-12-13T14:15:37.305902856Z" level=info msg="CreateContainer within sandbox \"1d3eaec567f026a0fd6a7fc04c1671fd67fa59552de8f28446a29d1dce9dc494\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:15:37.330431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount914330358.mount: Deactivated successfully. Dec 13 14:15:37.342683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1250549363.mount: Deactivated successfully. Dec 13 14:15:37.351935 env[1822]: time="2024-12-13T14:15:37.351818652Z" level=info msg="CreateContainer within sandbox \"1d3eaec567f026a0fd6a7fc04c1671fd67fa59552de8f28446a29d1dce9dc494\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"19d78eb365d4793e3e7ec89a993da9038fc46fac20bf467dae7e34eeed5a4b3d\"" Dec 13 14:15:37.353368 env[1822]: time="2024-12-13T14:15:37.353285215Z" level=info msg="StartContainer for \"19d78eb365d4793e3e7ec89a993da9038fc46fac20bf467dae7e34eeed5a4b3d\"" Dec 13 14:15:37.390163 systemd[1]: Started cri-containerd-19d78eb365d4793e3e7ec89a993da9038fc46fac20bf467dae7e34eeed5a4b3d.scope. Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2284 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139643738656233363564343739336533653765633839613939336461 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.445000 audit: BPF prog-id=72 op=LOAD Dec 13 14:15:37.445000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2284 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139643738656233363564343739336533653765633839613939336461 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit: BPF prog-id=73 op=LOAD Dec 13 14:15:37.446000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2284 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139643738656233363564343739336533653765633839613939336461 Dec 13 14:15:37.446000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:15:37.446000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.446000 audit: BPF prog-id=74 op=LOAD Dec 13 14:15:37.446000 audit[2357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2284 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139643738656233363564343739336533653765633839613939336461 Dec 13 14:15:37.488845 env[1822]: time="2024-12-13T14:15:37.488769866Z" level=info msg="StartContainer for \"19d78eb365d4793e3e7ec89a993da9038fc46fac20bf467dae7e34eeed5a4b3d\" returns successfully" Dec 13 14:15:37.612687 kubelet[2217]: E1213 14:15:37.612453 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:37.615000 audit[2410]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.615000 audit[2410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8632a00 a2=0 a3=1 items=0 ppid=2369 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:15:37.616000 audit[2411]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.616000 audit[2411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed056380 a2=0 a3=1 items=0 ppid=2369 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:15:37.618000 audit[2412]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.618000 audit[2412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2be4370 a2=0 a3=1 items=0 ppid=2369 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:15:37.618000 audit[2413]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.618000 audit[2413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa08b450 a2=0 a3=1 items=0 ppid=2369 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:15:37.622311 kernel: kauditd_printk_skb: 211 callbacks suppressed Dec 13 14:15:37.622467 kernel: audit: type=1327 audit(1734099337.618:495): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:15:37.621000 audit[2414]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.634415 kernel: audit: type=1325 audit(1734099337.621:496): table=filter:18 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.621000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbfb9700 a2=0 a3=1 items=0 ppid=2369 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:15:37.652164 kernel: audit: type=1300 audit(1734099337.621:496): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbfb9700 a2=0 a3=1 items=0 ppid=2369 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.652480 kernel: audit: type=1327 audit(1734099337.621:496): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:15:37.630000 audit[2415]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.658111 kernel: audit: type=1325 audit(1734099337.630:497): table=filter:19 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.630000 audit[2415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd942a3e0 a2=0 a3=1 items=0 ppid=2369 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.669550 kernel: audit: type=1300 audit(1734099337.630:497): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd942a3e0 a2=0 a3=1 items=0 ppid=2369 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:15:37.675738 kernel: audit: type=1327 audit(1734099337.630:497): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:15:37.726000 audit[2416]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.726000 audit[2416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff5433f60 a2=0 a3=1 items=0 ppid=2369 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.743503 kernel: audit: type=1325 audit(1734099337.726:498): table=filter:20 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.743576 kernel: audit: type=1300 audit(1734099337.726:498): arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff5433f60 a2=0 a3=1 items=0 ppid=2369 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:15:37.749441 kernel: audit: type=1327 audit(1734099337.726:498): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:15:37.744000 audit[2418]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.744000 audit[2418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff84cd420 a2=0 a3=1 items=0 ppid=2369 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:15:37.754000 audit[2421]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.754000 audit[2421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc7cba660 a2=0 a3=1 items=0 ppid=2369 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:15:37.759000 audit[2422]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.759000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb9192e0 a2=0 a3=1 items=0 ppid=2369 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:15:37.764000 audit[2424]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.764000 audit[2424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffedde7d10 a2=0 a3=1 items=0 ppid=2369 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:15:37.766000 audit[2425]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.766000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe16ee6c0 a2=0 a3=1 items=0 ppid=2369 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:15:37.773000 audit[2427]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.773000 audit[2427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffd38f020 a2=0 a3=1 items=0 ppid=2369 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:15:37.784000 audit[2430]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.784000 audit[2430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc6b275c0 a2=0 a3=1 items=0 ppid=2369 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:15:37.786000 audit[2431]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.786000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff07370a0 a2=0 a3=1 items=0 ppid=2369 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:15:37.791000 audit[2433]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.791000 audit[2433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcff62850 a2=0 a3=1 items=0 ppid=2369 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:15:37.793000 audit[2434]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.793000 audit[2434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe22d8030 a2=0 a3=1 items=0 ppid=2369 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:15:37.799000 audit[2436]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.799000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeac7b250 a2=0 a3=1 items=0 ppid=2369 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:15:37.806000 audit[2439]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.806000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff73d0230 a2=0 a3=1 items=0 ppid=2369 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:15:37.813000 audit[2442]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.813000 audit[2442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc5346e0 a2=0 a3=1 items=0 ppid=2369 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:15:37.816000 audit[2443]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.816000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff4852800 a2=0 a3=1 items=0 ppid=2369 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:15:37.820000 audit[2445]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.820000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffec0d48d0 a2=0 a3=1 items=0 ppid=2369 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:37.870000 audit[2450]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.870000 audit[2450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffaa7bbb0 a2=0 a3=1 items=0 ppid=2369 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:37.872000 audit[2451]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.872000 audit[2451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8f16c70 a2=0 a3=1 items=0 ppid=2369 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:15:37.878000 audit[2453]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.878000 audit[2453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff99dce00 a2=0 a3=1 items=0 ppid=2369 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:15:37.914000 audit[2459]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:37.914000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe7092700 a2=0 a3=1 items=0 ppid=2369 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:37.945000 audit[2459]: NETFILTER_CFG table=nat:40 family=2 entries=42 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:37.945000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19812 a0=3 a1=ffffe7092700 a2=0 a3=1 items=0 ppid=2369 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:37.970909 kubelet[2217]: E1213 14:15:37.970838 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:37.971000 audit[2467]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.971000 audit[2467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe1270730 a2=0 a3=1 items=0 ppid=2369 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:15:37.978000 audit[2469]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.978000 audit[2469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe11f2d00 a2=0 a3=1 items=0 ppid=2369 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:15:37.985000 audit[2472]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.985000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcd3dfb50 a2=0 a3=1 items=0 ppid=2369 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:15:37.989000 audit[2473]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.989000 audit[2473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5769a90 a2=0 a3=1 items=0 ppid=2369 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.989000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:15:37.998000 audit[2475]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:37.998000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffec75e050 a2=0 a3=1 items=0 ppid=2369 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:15:38.002000 audit[2476]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.002000 audit[2476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcff817e0 a2=0 a3=1 items=0 ppid=2369 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:15:38.008000 audit[2478]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.008000 audit[2478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff6b0cdd0 a2=0 a3=1 items=0 ppid=2369 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:15:38.015000 audit[2481]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.015000 audit[2481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc7d8abc0 a2=0 a3=1 items=0 ppid=2369 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:15:38.019000 audit[2482]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.019000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee6b84f0 a2=0 a3=1 items=0 ppid=2369 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:15:38.024000 audit[2484]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.024000 audit[2484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc91886e0 a2=0 a3=1 items=0 ppid=2369 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:15:38.026000 audit[2485]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.026000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbc2fba0 a2=0 a3=1 items=0 ppid=2369 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:15:38.031000 audit[2487]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.031000 audit[2487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde612ae0 a2=0 a3=1 items=0 ppid=2369 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:15:38.038000 audit[2490]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.038000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5fb02e0 a2=0 a3=1 items=0 ppid=2369 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:15:38.045000 audit[2493]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.045000 audit[2493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdde9e9b0 a2=0 a3=1 items=0 ppid=2369 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:15:38.048000 audit[2494]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.048000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff861a750 a2=0 a3=1 items=0 ppid=2369 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:15:38.052000 audit[2496]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.052000 audit[2496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc9657910 a2=0 a3=1 items=0 ppid=2369 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:38.059000 audit[2499]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.059000 audit[2499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe4ed3b50 a2=0 a3=1 items=0 ppid=2369 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:38.061000 audit[2500]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.061000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfe56250 a2=0 a3=1 items=0 ppid=2369 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:15:38.066000 audit[2502]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.066000 audit[2502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc3e689a0 a2=0 a3=1 items=0 ppid=2369 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:15:38.068000 audit[2503]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.068000 audit[2503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0ca74d0 a2=0 a3=1 items=0 ppid=2369 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:15:38.074000 audit[2505]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.074000 audit[2505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe511fdf0 a2=0 a3=1 items=0 ppid=2369 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.079118 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082072 kubelet[2217]: W1213 14:15:38.079149 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.079213 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.079605 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082072 kubelet[2217]: W1213 14:15:38.079647 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.079676 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.080305 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082072 kubelet[2217]: W1213 14:15:38.080390 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.080444 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.082072 kubelet[2217]: E1213 14:15:38.080894 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082654 kubelet[2217]: W1213 14:15:38.080915 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.082654 kubelet[2217]: E1213 14:15:38.080967 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.082654 kubelet[2217]: E1213 14:15:38.081429 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082654 kubelet[2217]: W1213 14:15:38.081449 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.082654 kubelet[2217]: E1213 14:15:38.081523 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.082654 kubelet[2217]: E1213 14:15:38.081878 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082654 kubelet[2217]: W1213 14:15:38.081896 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.082654 kubelet[2217]: E1213 14:15:38.081939 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.082654 kubelet[2217]: E1213 14:15:38.082257 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.082654 kubelet[2217]: W1213 14:15:38.082273 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.083171 kubelet[2217]: E1213 14:15:38.082300 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.083171 kubelet[2217]: E1213 14:15:38.082640 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.083171 kubelet[2217]: W1213 14:15:38.082656 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.083171 kubelet[2217]: E1213 14:15:38.082681 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.083171 kubelet[2217]: E1213 14:15:38.082961 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.083171 kubelet[2217]: W1213 14:15:38.082976 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.083171 kubelet[2217]: E1213 14:15:38.083000 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.083612 kubelet[2217]: E1213 14:15:38.083282 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.083612 kubelet[2217]: W1213 14:15:38.083297 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.083612 kubelet[2217]: E1213 14:15:38.083321 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.083780 kubelet[2217]: E1213 14:15:38.083706 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.083780 kubelet[2217]: W1213 14:15:38.083725 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.083780 kubelet[2217]: E1213 14:15:38.083751 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.084626 kubelet[2217]: E1213 14:15:38.084046 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.084626 kubelet[2217]: W1213 14:15:38.084077 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.084626 kubelet[2217]: E1213 14:15:38.084105 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.084626 kubelet[2217]: E1213 14:15:38.084466 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.084626 kubelet[2217]: W1213 14:15:38.084486 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.084626 kubelet[2217]: E1213 14:15:38.084512 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.085039 kubelet[2217]: E1213 14:15:38.084827 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.085039 kubelet[2217]: W1213 14:15:38.084861 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.085039 kubelet[2217]: E1213 14:15:38.084886 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.085235 kubelet[2217]: E1213 14:15:38.085177 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.085235 kubelet[2217]: W1213 14:15:38.085192 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.085235 kubelet[2217]: E1213 14:15:38.085216 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.086149 kubelet[2217]: E1213 14:15:38.085589 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.086149 kubelet[2217]: W1213 14:15:38.085618 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.086149 kubelet[2217]: E1213 14:15:38.085646 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.086149 kubelet[2217]: E1213 14:15:38.085941 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.086149 kubelet[2217]: W1213 14:15:38.085958 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.086149 kubelet[2217]: E1213 14:15:38.085984 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.086597 kubelet[2217]: E1213 14:15:38.086274 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.086597 kubelet[2217]: W1213 14:15:38.086291 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.086597 kubelet[2217]: E1213 14:15:38.086316 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.088312 kubelet[2217]: E1213 14:15:38.086630 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.088312 kubelet[2217]: W1213 14:15:38.086645 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.088312 kubelet[2217]: E1213 14:15:38.086669 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.088312 kubelet[2217]: E1213 14:15:38.087156 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.088312 kubelet[2217]: W1213 14:15:38.087177 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.088312 kubelet[2217]: E1213 14:15:38.087205 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.089000 audit[2528]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:38.089000 audit[2528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcbfd0130 a2=0 a3=1 items=0 ppid=2369 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:38.097000 audit[2530]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:15:38.097000 audit[2530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe0c0f0e0 a2=0 a3=1 items=0 ppid=2369 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.097000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:38.098000 audit[2530]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2530 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:15:38.098000 audit[2530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe0c0f0e0 a2=0 a3=1 items=0 ppid=2369 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.098000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:38.102884 kubelet[2217]: E1213 14:15:38.102834 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.102884 kubelet[2217]: W1213 14:15:38.102871 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.103167 kubelet[2217]: E1213 14:15:38.102910 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.103329 kubelet[2217]: E1213 14:15:38.103286 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.103329 kubelet[2217]: W1213 14:15:38.103314 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.103574 kubelet[2217]: E1213 14:15:38.103412 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.103815 kubelet[2217]: E1213 14:15:38.103776 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.103815 kubelet[2217]: W1213 14:15:38.103805 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.104020 kubelet[2217]: E1213 14:15:38.103846 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.104163 kubelet[2217]: E1213 14:15:38.104138 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.104286 kubelet[2217]: W1213 14:15:38.104162 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.104286 kubelet[2217]: E1213 14:15:38.104200 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.104517 kubelet[2217]: E1213 14:15:38.104490 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.104688 kubelet[2217]: W1213 14:15:38.104516 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.104688 kubelet[2217]: E1213 14:15:38.104572 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.104824 kubelet[2217]: E1213 14:15:38.104808 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.104964 kubelet[2217]: W1213 14:15:38.104823 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.104964 kubelet[2217]: E1213 14:15:38.104874 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.105183 kubelet[2217]: E1213 14:15:38.105158 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.105311 kubelet[2217]: W1213 14:15:38.105183 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.105311 kubelet[2217]: E1213 14:15:38.105221 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.105572 kubelet[2217]: E1213 14:15:38.105546 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.105698 kubelet[2217]: W1213 14:15:38.105571 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.105698 kubelet[2217]: E1213 14:15:38.105610 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.105951 kubelet[2217]: E1213 14:15:38.105912 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.105951 kubelet[2217]: W1213 14:15:38.105940 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.106951 kubelet[2217]: E1213 14:15:38.105996 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.106951 kubelet[2217]: E1213 14:15:38.106222 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.106951 kubelet[2217]: W1213 14:15:38.106238 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.106951 kubelet[2217]: E1213 14:15:38.106261 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.106951 kubelet[2217]: E1213 14:15:38.106656 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.106951 kubelet[2217]: W1213 14:15:38.106674 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.106951 kubelet[2217]: E1213 14:15:38.106716 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.107313 kubelet[2217]: E1213 14:15:38.107016 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:38.107313 kubelet[2217]: W1213 14:15:38.107033 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:38.107313 kubelet[2217]: E1213 14:15:38.107059 2217 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:38.613151 kubelet[2217]: E1213 14:15:38.613068 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:38.646942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount813877711.mount: Deactivated successfully. Dec 13 14:15:38.860269 env[1822]: time="2024-12-13T14:15:38.860200251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:38.863455 env[1822]: time="2024-12-13T14:15:38.863239681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:38.866764 env[1822]: time="2024-12-13T14:15:38.866685850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:38.870055 env[1822]: time="2024-12-13T14:15:38.869991441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:38.871246 env[1822]: time="2024-12-13T14:15:38.871165927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:15:38.876467 env[1822]: time="2024-12-13T14:15:38.876405597Z" level=info msg="CreateContainer within sandbox \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:15:38.899381 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1934644225.mount: Deactivated successfully. Dec 13 14:15:38.923470 env[1822]: time="2024-12-13T14:15:38.923374884Z" level=info msg="CreateContainer within sandbox \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b\"" Dec 13 14:15:38.924577 env[1822]: time="2024-12-13T14:15:38.924520362Z" level=info msg="StartContainer for \"3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b\"" Dec 13 14:15:38.964438 systemd[1]: Started cri-containerd-3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b.scope. Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2273 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393634663535303534616564623633636162306132323333366432 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit: BPF prog-id=75 op=LOAD Dec 13 14:15:39.006000 audit[2551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2273 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393634663535303534616564623633636162306132323333366432 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.006000 audit: BPF prog-id=76 op=LOAD Dec 13 14:15:39.006000 audit[2551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2273 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393634663535303534616564623633636162306132323333366432 Dec 13 14:15:39.007000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:15:39.007000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.007000 audit: BPF prog-id=77 op=LOAD Dec 13 14:15:39.007000 audit[2551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2273 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393634663535303534616564623633636162306132323333366432 Dec 13 14:15:39.043213 env[1822]: time="2024-12-13T14:15:39.043127099Z" level=info msg="StartContainer for \"3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b\" returns successfully" Dec 13 14:15:39.064860 systemd[1]: cri-containerd-3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b.scope: Deactivated successfully. Dec 13 14:15:39.067000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:15:39.567484 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b-rootfs.mount: Deactivated successfully. Dec 13 14:15:39.613942 kubelet[2217]: E1213 14:15:39.613882 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:39.701104 env[1822]: time="2024-12-13T14:15:39.701042336Z" level=info msg="shim disconnected" id=3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b Dec 13 14:15:39.701387 env[1822]: time="2024-12-13T14:15:39.701329621Z" level=warning msg="cleaning up after shim disconnected" id=3f964f55054aedb63cab0a22336d2e96e116ec948ae6b82a4948246ed4230f0b namespace=k8s.io Dec 13 14:15:39.701518 env[1822]: time="2024-12-13T14:15:39.701490504Z" level=info msg="cleaning up dead shim" Dec 13 14:15:39.715707 env[1822]: time="2024-12-13T14:15:39.715649502Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:15:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2594 runtime=io.containerd.runc.v2\n" Dec 13 14:15:39.895000 audit[2608]: NETFILTER_CFG table=filter:65 family=2 entries=10 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:39.895000 audit[2608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc22f5530 a2=0 a3=1 items=0 ppid=2369 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:39.901000 audit[2608]: NETFILTER_CFG table=nat:66 family=2 entries=44 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:39.901000 audit[2608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc22f5530 a2=0 a3=1 items=0 ppid=2369 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:39.951000 audit[2610]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:39.951000 audit[2610]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd296d5a0 a2=0 a3=1 items=0 ppid=2369 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:39.966000 audit[2610]: NETFILTER_CFG table=nat:68 family=2 entries=56 op=nft_register_chain pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:39.966000 audit[2610]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd296d5a0 a2=0 a3=1 items=0 ppid=2369 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:39.970820 kubelet[2217]: E1213 14:15:39.970754 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:40.000514 amazon-ssm-agent[1796]: 2024-12-13 14:15:40 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:15:40.018885 env[1822]: time="2024-12-13T14:15:40.018825148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:15:40.087900 kubelet[2217]: I1213 14:15:40.087676 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wrdkt" podStartSLOduration=5.5805164210000004 podStartE2EDuration="8.087594324s" podCreationTimestamp="2024-12-13 14:15:32 +0000 UTC" firstStartedPulling="2024-12-13 14:15:34.792049651 +0000 UTC m=+4.361316374" lastFinishedPulling="2024-12-13 14:15:37.299127542 +0000 UTC m=+6.868394277" observedRunningTime="2024-12-13 14:15:38.020171466 +0000 UTC m=+7.589438213" watchObservedRunningTime="2024-12-13 14:15:40.087594324 +0000 UTC m=+9.656861059" Dec 13 14:15:40.614440 kubelet[2217]: E1213 14:15:40.614371 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:40.982000 audit[2613]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:40.982000 audit[2613]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffe040d20 a2=0 a3=1 items=0 ppid=2369 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:40.992000 audit[2613]: NETFILTER_CFG table=nat:70 family=2 entries=20 op=nft_register_rule pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:40.992000 audit[2613]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffe040d20 a2=0 a3=1 items=0 ppid=2369 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:41.615486 kubelet[2217]: E1213 14:15:41.615424 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:41.970331 kubelet[2217]: E1213 14:15:41.970256 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:42.616114 kubelet[2217]: E1213 14:15:42.616060 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:43.616954 kubelet[2217]: E1213 14:15:43.616884 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:43.971449 kubelet[2217]: E1213 14:15:43.970949 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:44.617736 kubelet[2217]: E1213 14:15:44.617640 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:45.539816 env[1822]: time="2024-12-13T14:15:45.539752449Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.543429 env[1822]: time="2024-12-13T14:15:45.543358555Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.546482 env[1822]: time="2024-12-13T14:15:45.546405907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.549579 env[1822]: time="2024-12-13T14:15:45.549508087Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.550916 env[1822]: time="2024-12-13T14:15:45.550856864Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:15:45.554673 env[1822]: time="2024-12-13T14:15:45.554616306Z" level=info msg="CreateContainer within sandbox \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:15:45.581154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1168825154.mount: Deactivated successfully. Dec 13 14:15:45.598996 env[1822]: time="2024-12-13T14:15:45.598933359Z" level=info msg="CreateContainer within sandbox \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3\"" Dec 13 14:15:45.600382 env[1822]: time="2024-12-13T14:15:45.600310151Z" level=info msg="StartContainer for \"aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3\"" Dec 13 14:15:45.618425 kubelet[2217]: E1213 14:15:45.618295 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:45.639038 systemd[1]: Started cri-containerd-aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3.scope. Dec 13 14:15:45.652575 systemd[1]: run-containerd-runc-k8s.io-aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3-runc.jf6RIM.mount: Deactivated successfully. Dec 13 14:15:45.696539 kernel: kauditd_printk_skb: 194 callbacks suppressed Dec 13 14:15:45.696697 kernel: audit: type=1400 audit(1734099345.686:556): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.686000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.686000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2273 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.708320 kernel: audit: type=1300 audit(1734099345.686:556): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2273 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643363313337613566336637613930656531303562316362383738 Dec 13 14:15:45.719026 kernel: audit: type=1327 audit(1734099345.686:556): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643363313337613566336637613930656531303562316362383738 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.727182 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.736746 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.743875 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.752052 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.752254 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.756962 env[1822]: time="2024-12-13T14:15:45.756825966Z" level=info msg="StartContainer for \"aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3\" returns successfully" Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.767493 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.774957 kernel: audit: type=1400 audit(1734099345.687:557): avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.687000 audit: BPF prog-id=78 op=LOAD Dec 13 14:15:45.687000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2273 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643363313337613566336637613930656531303562316362383738 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.688000 audit: BPF prog-id=79 op=LOAD Dec 13 14:15:45.688000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2273 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643363313337613566336637613930656531303562316362383738 Dec 13 14:15:45.695000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:15:45.695000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:45.695000 audit: BPF prog-id=80 op=LOAD Dec 13 14:15:45.695000 audit[2622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2273 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165643363313337613566336637613930656531303562316362383738 Dec 13 14:15:45.970471 kubelet[2217]: E1213 14:15:45.969958 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:46.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:46.607044 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:15:46.618900 kubelet[2217]: E1213 14:15:46.618821 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:46.629000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:15:46.629000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:15:46.629000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:15:47.363108 env[1822]: time="2024-12-13T14:15:47.362941476Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:15:47.367642 systemd[1]: cri-containerd-aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3.scope: Deactivated successfully. Dec 13 14:15:47.372000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:15:47.402302 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3-rootfs.mount: Deactivated successfully. Dec 13 14:15:47.446463 kubelet[2217]: I1213 14:15:47.445718 2217 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:15:47.619993 kubelet[2217]: E1213 14:15:47.619816 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:47.980659 systemd[1]: Created slice kubepods-besteffort-pod1325b8d0_8bdd_42ab_a504_b3b56836607d.slice. Dec 13 14:15:47.986865 env[1822]: time="2024-12-13T14:15:47.986807742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwc7q,Uid:1325b8d0-8bdd-42ab-a504-b3b56836607d,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:48.621005 kubelet[2217]: E1213 14:15:48.620933 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:48.636066 env[1822]: time="2024-12-13T14:15:48.635950493Z" level=error msg="Failed to destroy network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:48.638945 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3-shm.mount: Deactivated successfully. Dec 13 14:15:48.642762 env[1822]: time="2024-12-13T14:15:48.640727101Z" level=error msg="encountered an error cleaning up failed sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:48.642762 env[1822]: time="2024-12-13T14:15:48.640846899Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwc7q,Uid:1325b8d0-8bdd-42ab-a504-b3b56836607d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:48.643018 kubelet[2217]: E1213 14:15:48.641261 2217 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:48.643018 kubelet[2217]: E1213 14:15:48.641401 2217 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:48.643018 kubelet[2217]: E1213 14:15:48.641465 2217 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lwc7q" Dec 13 14:15:48.643250 kubelet[2217]: E1213 14:15:48.641574 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lwc7q_calico-system(1325b8d0-8bdd-42ab-a504-b3b56836607d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lwc7q_calico-system(1325b8d0-8bdd-42ab-a504-b3b56836607d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:49.000000 audit[2695]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:49.000000 audit[2695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff34ffe60 a2=0 a3=1 items=0 ppid=2369 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:49.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:49.006000 audit[2695]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:49.006000 audit[2695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff34ffe60 a2=0 a3=1 items=0 ppid=2369 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:49.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:49.040230 kubelet[2217]: I1213 14:15:49.040181 2217 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:15:49.041703 env[1822]: time="2024-12-13T14:15:49.041630110Z" level=info msg="StopPodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\"" Dec 13 14:15:49.090079 env[1822]: time="2024-12-13T14:15:49.089991925Z" level=error msg="StopPodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" failed" error="failed to destroy network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:49.090761 kubelet[2217]: E1213 14:15:49.090703 2217 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:15:49.090951 kubelet[2217]: E1213 14:15:49.090823 2217 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3"} Dec 13 14:15:49.090951 kubelet[2217]: E1213 14:15:49.090893 2217 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1325b8d0-8bdd-42ab-a504-b3b56836607d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:49.091154 kubelet[2217]: E1213 14:15:49.090950 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1325b8d0-8bdd-42ab-a504-b3b56836607d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lwc7q" podUID="1325b8d0-8bdd-42ab-a504-b3b56836607d" Dec 13 14:15:49.305482 env[1822]: time="2024-12-13T14:15:49.304514939Z" level=info msg="shim disconnected" id=aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3 Dec 13 14:15:49.305659 env[1822]: time="2024-12-13T14:15:49.305423178Z" level=warning msg="cleaning up after shim disconnected" id=aed3c137a5f3f7a90ee105b1cb878cb5cb7001d8330ab498ab712fab1710bfe3 namespace=k8s.io Dec 13 14:15:49.305775 env[1822]: time="2024-12-13T14:15:49.305660101Z" level=info msg="cleaning up dead shim" Dec 13 14:15:49.322849 env[1822]: time="2024-12-13T14:15:49.322777772Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:15:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2714 runtime=io.containerd.runc.v2\n" Dec 13 14:15:49.622404 kubelet[2217]: E1213 14:15:49.621952 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:50.049918 env[1822]: time="2024-12-13T14:15:50.049837628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:15:50.622493 kubelet[2217]: E1213 14:15:50.622410 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:51.622889 kubelet[2217]: E1213 14:15:51.622801 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:52.104447 kubelet[2217]: I1213 14:15:52.104277 2217 topology_manager.go:215] "Topology Admit Handler" podUID="4233f08c-e62f-461a-9e9b-5b1b732184dd" podNamespace="default" podName="nginx-deployment-6d5f899847-zq45c" Dec 13 14:15:52.115742 systemd[1]: Created slice kubepods-besteffort-pod4233f08c_e62f_461a_9e9b_5b1b732184dd.slice. Dec 13 14:15:52.200576 kubelet[2217]: I1213 14:15:52.200529 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kqblz\" (UniqueName: \"kubernetes.io/projected/4233f08c-e62f-461a-9e9b-5b1b732184dd-kube-api-access-kqblz\") pod \"nginx-deployment-6d5f899847-zq45c\" (UID: \"4233f08c-e62f-461a-9e9b-5b1b732184dd\") " pod="default/nginx-deployment-6d5f899847-zq45c" Dec 13 14:15:52.423418 env[1822]: time="2024-12-13T14:15:52.423232296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zq45c,Uid:4233f08c-e62f-461a-9e9b-5b1b732184dd,Namespace:default,Attempt:0,}" Dec 13 14:15:52.606956 kubelet[2217]: E1213 14:15:52.606884 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:52.623301 kubelet[2217]: E1213 14:15:52.623228 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:53.373948 env[1822]: time="2024-12-13T14:15:53.373853611Z" level=error msg="Failed to destroy network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:53.383582 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832-shm.mount: Deactivated successfully. Dec 13 14:15:53.389097 env[1822]: time="2024-12-13T14:15:53.386385277Z" level=error msg="encountered an error cleaning up failed sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:53.389097 env[1822]: time="2024-12-13T14:15:53.386494915Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zq45c,Uid:4233f08c-e62f-461a-9e9b-5b1b732184dd,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:53.389444 kubelet[2217]: E1213 14:15:53.386915 2217 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:53.389444 kubelet[2217]: E1213 14:15:53.387017 2217 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-zq45c" Dec 13 14:15:53.389444 kubelet[2217]: E1213 14:15:53.387082 2217 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-zq45c" Dec 13 14:15:53.389681 kubelet[2217]: E1213 14:15:53.387198 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-zq45c_default(4233f08c-e62f-461a-9e9b-5b1b732184dd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-zq45c_default(4233f08c-e62f-461a-9e9b-5b1b732184dd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-zq45c" podUID="4233f08c-e62f-461a-9e9b-5b1b732184dd" Dec 13 14:15:53.623909 kubelet[2217]: E1213 14:15:53.623847 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:54.057525 kubelet[2217]: I1213 14:15:54.057478 2217 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:15:54.058685 env[1822]: time="2024-12-13T14:15:54.058613370Z" level=info msg="StopPodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\"" Dec 13 14:15:54.134066 env[1822]: time="2024-12-13T14:15:54.133970960Z" level=error msg="StopPodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" failed" error="failed to destroy network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:54.134420 kubelet[2217]: E1213 14:15:54.134378 2217 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:15:54.134539 kubelet[2217]: E1213 14:15:54.134470 2217 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832"} Dec 13 14:15:54.134609 kubelet[2217]: E1213 14:15:54.134566 2217 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4233f08c-e62f-461a-9e9b-5b1b732184dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:54.134729 kubelet[2217]: E1213 14:15:54.134645 2217 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4233f08c-e62f-461a-9e9b-5b1b732184dd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-zq45c" podUID="4233f08c-e62f-461a-9e9b-5b1b732184dd" Dec 13 14:15:54.624857 kubelet[2217]: E1213 14:15:54.624787 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:54.966222 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 14:15:54.966416 kernel: audit: type=1325 audit(1734099354.957:569): table=filter:73 family=2 entries=9 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.957000 audit[2786]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.957000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc7ae6470 a2=0 a3=1 items=0 ppid=2369 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.977822 kernel: audit: type=1300 audit(1734099354.957:569): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc7ae6470 a2=0 a3=1 items=0 ppid=2369 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.983225 kernel: audit: type=1327 audit(1734099354.957:569): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.983000 audit[2786]: NETFILTER_CFG table=nat:74 family=2 entries=27 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.983000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc7ae6470 a2=0 a3=1 items=0 ppid=2369 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:55.002212 kernel: audit: type=1325 audit(1734099354.983:570): table=nat:74 family=2 entries=27 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:55.002307 kernel: audit: type=1300 audit(1734099354.983:570): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc7ae6470 a2=0 a3=1 items=0 ppid=2369 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:55.007531 kernel: audit: type=1327 audit(1734099354.983:570): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:55.625331 kubelet[2217]: E1213 14:15:55.625276 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:56.625848 kubelet[2217]: E1213 14:15:56.625783 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:57.371000 audit[2788]: NETFILTER_CFG table=filter:75 family=2 entries=8 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:57.371000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffe0a8450 a2=0 a3=1 items=0 ppid=2369 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.388943 kernel: audit: type=1325 audit(1734099357.371:571): table=filter:75 family=2 entries=8 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:57.389056 kernel: audit: type=1300 audit(1734099357.371:571): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffe0a8450 a2=0 a3=1 items=0 ppid=2369 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:57.398132 kernel: audit: type=1327 audit(1734099357.371:571): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:57.397000 audit[2788]: NETFILTER_CFG table=nat:76 family=2 entries=34 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:57.397000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffe0a8450 a2=0 a3=1 items=0 ppid=2369 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:57.405046 kernel: audit: type=1325 audit(1734099357.397:572): table=nat:76 family=2 entries=34 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:57.626539 kubelet[2217]: E1213 14:15:57.626430 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:58.627164 kubelet[2217]: E1213 14:15:58.627108 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:59.309293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2931762985.mount: Deactivated successfully. Dec 13 14:15:59.419822 env[1822]: time="2024-12-13T14:15:59.419753297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.423460 env[1822]: time="2024-12-13T14:15:59.423399740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.426871 env[1822]: time="2024-12-13T14:15:59.426805816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.429660 env[1822]: time="2024-12-13T14:15:59.429607102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.430526 env[1822]: time="2024-12-13T14:15:59.430476686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:15:59.457632 env[1822]: time="2024-12-13T14:15:59.457568493Z" level=info msg="CreateContainer within sandbox \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:15:59.482908 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3431340112.mount: Deactivated successfully. Dec 13 14:15:59.518542 env[1822]: time="2024-12-13T14:15:59.518472348Z" level=info msg="CreateContainer within sandbox \"000b0ac295a6c7a982ecf979b40fc1b6d8048087229b6e3d54f5516bfea26932\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58\"" Dec 13 14:15:59.519515 env[1822]: time="2024-12-13T14:15:59.519462050Z" level=info msg="StartContainer for \"d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58\"" Dec 13 14:15:59.550552 systemd[1]: Started cri-containerd-d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58.scope. Dec 13 14:15:59.591000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.591000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2273 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:59.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313365356666643762373866323034636565636564383533353161 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.592000 audit: BPF prog-id=81 op=LOAD Dec 13 14:15:59.592000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2273 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:59.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313365356666643762373866323034636565636564383533353161 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.594000 audit: BPF prog-id=82 op=LOAD Dec 13 14:15:59.594000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2273 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:59.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313365356666643762373866323034636565636564383533353161 Dec 13 14:15:59.596000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:15:59.596000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:59.596000 audit: BPF prog-id=83 op=LOAD Dec 13 14:15:59.596000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2273 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:59.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313365356666643762373866323034636565636564383533353161 Dec 13 14:15:59.628150 kubelet[2217]: E1213 14:15:59.627978 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:59.628984 env[1822]: time="2024-12-13T14:15:59.628927093Z" level=info msg="StartContainer for \"d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58\" returns successfully" Dec 13 14:15:59.815620 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:15:59.815802 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:16:00.629062 kubelet[2217]: E1213 14:16:00.629015 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:01.320404 kernel: kauditd_printk_skb: 45 callbacks suppressed Dec 13 14:16:01.320578 kernel: audit: type=1400 audit(1734099361.310:579): avc: denied { write } for pid=2948 comm="tee" name="fd" dev="proc" ino=15341 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.310000 audit[2948]: AVC avc: denied { write } for pid=2948 comm="tee" name="fd" dev="proc" ino=15341 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.310000 audit[2948]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd90d7a1d a2=241 a3=1b6 items=1 ppid=2910 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.334317 kernel: audit: type=1300 audit(1734099361.310:579): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd90d7a1d a2=241 a3=1b6 items=1 ppid=2910 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.310000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:16:01.310000 audit: PATH item=0 name="/dev/fd/63" inode=15335 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.348348 kernel: audit: type=1307 audit(1734099361.310:579): cwd="/etc/service/enabled/bird6/log" Dec 13 14:16:01.348490 kernel: audit: type=1302 audit(1734099361.310:579): item=0 name="/dev/fd/63" inode=15335 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.310000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.357987 kernel: audit: type=1327 audit(1734099361.310:579): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.325000 audit[2955]: AVC avc: denied { write } for pid=2955 comm="tee" name="fd" dev="proc" ino=15353 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.325000 audit[2955]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9171a1f a2=241 a3=1b6 items=1 ppid=2915 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.366486 kernel: audit: type=1400 audit(1734099361.325:580): avc: denied { write } for pid=2955 comm="tee" name="fd" dev="proc" ino=15353 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.325000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:16:01.383125 kernel: audit: type=1300 audit(1734099361.325:580): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9171a1f a2=241 a3=1b6 items=1 ppid=2915 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.383255 kernel: audit: type=1307 audit(1734099361.325:580): cwd="/etc/service/enabled/cni/log" Dec 13 14:16:01.325000 audit: PATH item=0 name="/dev/fd/63" inode=15919 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.325000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.391467 kernel: audit: type=1302 audit(1734099361.325:580): item=0 name="/dev/fd/63" inode=15919 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.339000 audit[2952]: AVC avc: denied { write } for pid=2952 comm="tee" name="fd" dev="proc" ino=16385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.339000 audit[2952]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde7a3a0d a2=241 a3=1b6 items=1 ppid=2911 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.339000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:16:01.339000 audit: PATH item=0 name="/dev/fd/63" inode=15338 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.339000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.331000 audit[2960]: AVC avc: denied { write } for pid=2960 comm="tee" name="fd" dev="proc" ino=15357 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.331000 audit[2960]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc8731a1d a2=241 a3=1b6 items=1 ppid=2908 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.400467 kernel: audit: type=1327 audit(1734099361.325:580): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.331000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:16:01.331000 audit: PATH item=0 name="/dev/fd/63" inode=15922 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.331000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.356000 audit[2966]: AVC avc: denied { write } for pid=2966 comm="tee" name="fd" dev="proc" ino=16395 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.356000 audit[2966]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe4c06a0e a2=241 a3=1b6 items=1 ppid=2929 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.356000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:16:01.356000 audit: PATH item=0 name="/dev/fd/63" inode=15358 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.356000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.395000 audit[2979]: AVC avc: denied { write } for pid=2979 comm="tee" name="fd" dev="proc" ino=16408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.395000 audit[2979]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed567a1d a2=241 a3=1b6 items=1 ppid=2927 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.395000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:16:01.395000 audit: PATH item=0 name="/dev/fd/63" inode=15923 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.395000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.426000 audit[2983]: AVC avc: denied { write } for pid=2983 comm="tee" name="fd" dev="proc" ino=15927 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:01.426000 audit[2983]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe578fa1e a2=241 a3=1b6 items=1 ppid=2933 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.426000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:16:01.426000 audit: PATH item=0 name="/dev/fd/63" inode=15924 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:01.426000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:01.473988 update_engine[1810]: I1213 14:16:01.473399 1810 update_attempter.cc:509] Updating boot flags... Dec 13 14:16:01.630749 kubelet[2217]: E1213 14:16:01.630584 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.942000 audit: BPF prog-id=84 op=LOAD Dec 13 14:16:01.942000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc2fe8b18 a2=98 a3=ffffc2fe8b08 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:01.944000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.944000 audit: BPF prog-id=85 op=LOAD Dec 13 14:16:01.944000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2fe87a8 a2=74 a3=95 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:01.946000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:01.946000 audit: BPF prog-id=86 op=LOAD Dec 13 14:16:01.946000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2fe8808 a2=94 a3=2 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:01.946000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:01.948000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.115000 audit: BPF prog-id=87 op=LOAD Dec 13 14:16:02.115000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc2fe87c8 a2=40 a3=ffffc2fe87f8 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.116000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:16:02.117000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.117000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc2fe88e0 a2=50 a3=0 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.133000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.133000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2fe8838 a2=28 a3=ffffc2fe8968 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.133000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.133000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2fe8868 a2=28 a3=ffffc2fe8998 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.134000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.134000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2fe8718 a2=28 a3=ffffc2fe8848 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.134000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.134000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.134000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2fe8888 a2=28 a3=ffffc2fe89b8 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.134000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.135000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.135000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2fe8868 a2=28 a3=ffffc2fe8998 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.135000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.135000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.135000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2fe8858 a2=28 a3=ffffc2fe8988 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.135000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.135000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.135000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2fe8888 a2=28 a3=ffffc2fe89b8 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.135000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.136000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.136000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2fe8868 a2=28 a3=ffffc2fe8998 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.136000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.136000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2fe8888 a2=28 a3=ffffc2fe89b8 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.137000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.137000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc2fe8858 a2=28 a3=ffffc2fe8988 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.137000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.137000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.137000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc2fe88d8 a2=28 a3=ffffc2fe8a18 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.137000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc2fe8610 a2=50 a3=0 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.138000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit: BPF prog-id=88 op=LOAD Dec 13 14:16:02.138000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc2fe8618 a2=94 a3=5 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.138000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.138000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc2fe8720 a2=50 a3=0 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.138000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc2fe8868 a2=4 a3=3 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.138000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { confidentiality } for pid=3114 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:02.138000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2fe8848 a2=94 a3=6 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.138000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.138000 audit[3114]: AVC avc: denied { confidentiality } for pid=3114 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:02.138000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2fe8018 a2=94 a3=83 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.138000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.139000 audit[3114]: AVC avc: denied { confidentiality } for pid=3114 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:02.139000 audit[3114]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc2fe8018 a2=94 a3=83 items=0 ppid=2909 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.157000 audit: BPF prog-id=89 op=LOAD Dec 13 14:16:02.157000 audit[3117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe73dae08 a2=98 a3=ffffe73dadf8 items=0 ppid=2909 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.157000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:16:02.159000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.159000 audit: BPF prog-id=90 op=LOAD Dec 13 14:16:02.159000 audit[3117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe73dacb8 a2=74 a3=95 items=0 ppid=2909 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.159000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:16:02.160000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.160000 audit: BPF prog-id=91 op=LOAD Dec 13 14:16:02.160000 audit[3117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe73dace8 a2=40 a3=ffffe73dad18 items=0 ppid=2909 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.160000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:16:02.162000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:16:02.275454 (udev-worker)[3005]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:02.281463 systemd-networkd[1536]: vxlan.calico: Link UP Dec 13 14:16:02.281486 systemd-networkd[1536]: vxlan.calico: Gained carrier Dec 13 14:16:02.330786 (udev-worker)[3001]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.332000 audit: BPF prog-id=92 op=LOAD Dec 13 14:16:02.332000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfeabe68 a2=98 a3=ffffcfeabe58 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.333000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit: BPF prog-id=93 op=LOAD Dec 13 14:16:02.333000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfeabb48 a2=74 a3=95 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.333000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.333000 audit: BPF prog-id=94 op=LOAD Dec 13 14:16:02.333000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfeabba8 a2=94 a3=2 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfeabbd8 a2=28 a3=ffffcfeabd08 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfeabc08 a2=28 a3=ffffcfeabd38 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfeabab8 a2=28 a3=ffffcfeabbe8 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfeabc28 a2=28 a3=ffffcfeabd58 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfeabc08 a2=28 a3=ffffcfeabd38 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfeabbf8 a2=28 a3=ffffcfeabd28 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfeabc28 a2=28 a3=ffffcfeabd58 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfeabc08 a2=28 a3=ffffcfeabd38 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfeabc28 a2=28 a3=ffffcfeabd58 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcfeabbf8 a2=28 a3=ffffcfeabd28 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcfeabc78 a2=28 a3=ffffcfeabdb8 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.334000 audit: BPF prog-id=95 op=LOAD Dec 13 14:16:02.334000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfeaba98 a2=40 a3=ffffcfeabac8 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.334000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.334000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:16:02.335000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.335000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcfeabac0 a2=50 a3=0 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcfeabac0 a2=50 a3=0 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit: BPF prog-id=96 op=LOAD Dec 13 14:16:02.336000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfeab228 a2=94 a3=2 items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.336000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.336000 audit: BPF prog-id=97 op=LOAD Dec 13 14:16:02.336000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcfeab3b8 a2=94 a3=2d items=0 ppid=2909 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.343000 audit: BPF prog-id=98 op=LOAD Dec 13 14:16:02.343000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff7d9b0b8 a2=98 a3=fffff7d9b0a8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.343000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.343000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit: BPF prog-id=99 op=LOAD Dec 13 14:16:02.344000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7d9ad48 a2=74 a3=95 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.344000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.344000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.344000 audit: BPF prog-id=100 op=LOAD Dec 13 14:16:02.344000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7d9ada8 a2=94 a3=2 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.344000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.344000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit: BPF prog-id=101 op=LOAD Dec 13 14:16:02.530000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7d9ad68 a2=40 a3=fffff7d9ad98 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.530000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:16:02.530000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.530000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff7d9ae80 a2=50 a3=0 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d9add8 a2=28 a3=fffff7d9af08 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d9ae08 a2=28 a3=fffff7d9af38 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d9acb8 a2=28 a3=fffff7d9ade8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d9ae28 a2=28 a3=fffff7d9af58 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d9ae08 a2=28 a3=fffff7d9af38 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d9adf8 a2=28 a3=fffff7d9af28 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d9ae28 a2=28 a3=fffff7d9af58 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d9ae08 a2=28 a3=fffff7d9af38 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d9ae28 a2=28 a3=fffff7d9af58 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.553000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.553000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d9adf8 a2=28 a3=fffff7d9af28 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.553000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d9ae78 a2=28 a3=fffff7d9afb8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff7d9abb0 a2=50 a3=0 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit: BPF prog-id=102 op=LOAD Dec 13 14:16:02.554000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff7d9abb8 a2=94 a3=5 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.554000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff7d9acc0 a2=50 a3=0 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff7d9ae08 a2=4 a3=3 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.554000 audit[3150]: AVC avc: denied { confidentiality } for pid=3150 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:02.554000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7d9ade8 a2=94 a3=6 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.554000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.555000 audit[3150]: AVC avc: denied { confidentiality } for pid=3150 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:02.555000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7d9a5b8 a2=94 a3=83 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.555000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.556000 audit[3150]: AVC avc: denied { confidentiality } for pid=3150 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:02.556000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7d9a5b8 a2=94 a3=83 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.556000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.557000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.557000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7d9bff8 a2=10 a3=fffff7d9c0e8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.557000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.557000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.557000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7d9beb8 a2=10 a3=fffff7d9bfa8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.557000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.557000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.557000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7d9be28 a2=10 a3=fffff7d9bfa8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.557000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.557000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:02.557000 audit[3150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7d9be28 a2=10 a3=fffff7d9bfa8 items=0 ppid=2909 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.557000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:02.569000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:16:02.631525 kubelet[2217]: E1213 14:16:02.631440 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:02.666000 audit[3172]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=3172 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:02.666000 audit[3172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe1f636b0 a2=0 a3=ffff82496fa8 items=0 ppid=2909 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.666000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:02.675000 audit[3171]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:02.675000 audit[3171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffca9fc830 a2=0 a3=ffff93fa4fa8 items=0 ppid=2909 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.675000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:02.680000 audit[3173]: NETFILTER_CFG table=filter:79 family=2 entries=39 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:02.680000 audit[3173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffffb169810 a2=0 a3=ffff9c459fa8 items=0 ppid=2909 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.680000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:02.687000 audit[3170]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=3170 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:02.687000 audit[3170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffd409ac50 a2=0 a3=ffffb5350fa8 items=0 ppid=2909 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:02.687000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:02.974588 env[1822]: time="2024-12-13T14:16:02.974443299Z" level=info msg="StopPodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\"" Dec 13 14:16:03.071718 kubelet[2217]: I1213 14:16:03.071658 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8wxdn" podStartSLOduration=6.446448856 podStartE2EDuration="31.071596989s" podCreationTimestamp="2024-12-13 14:15:32 +0000 UTC" firstStartedPulling="2024-12-13 14:15:34.805731074 +0000 UTC m=+4.374997785" lastFinishedPulling="2024-12-13 14:15:59.430879207 +0000 UTC m=+29.000145918" observedRunningTime="2024-12-13 14:16:00.104421443 +0000 UTC m=+29.673688202" watchObservedRunningTime="2024-12-13 14:16:03.071596989 +0000 UTC m=+32.640863724" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.073 [INFO][3195] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.073 [INFO][3195] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" iface="eth0" netns="/var/run/netns/cni-c12d450f-1901-ba10-68f9-6e522691c29c" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.074 [INFO][3195] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" iface="eth0" netns="/var/run/netns/cni-c12d450f-1901-ba10-68f9-6e522691c29c" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.074 [INFO][3195] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" iface="eth0" netns="/var/run/netns/cni-c12d450f-1901-ba10-68f9-6e522691c29c" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.075 [INFO][3195] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.075 [INFO][3195] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.125 [INFO][3202] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.126 [INFO][3202] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.126 [INFO][3202] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.139 [WARNING][3202] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.139 [INFO][3202] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.142 [INFO][3202] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:03.150310 env[1822]: 2024-12-13 14:16:03.147 [INFO][3195] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:03.156083 env[1822]: time="2024-12-13T14:16:03.153983952Z" level=info msg="TearDown network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" successfully" Dec 13 14:16:03.156083 env[1822]: time="2024-12-13T14:16:03.154043738Z" level=info msg="StopPodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" returns successfully" Dec 13 14:16:03.153905 systemd[1]: run-netns-cni\x2dc12d450f\x2d1901\x2dba10\x2d68f9\x2d6e522691c29c.mount: Deactivated successfully. Dec 13 14:16:03.157084 env[1822]: time="2024-12-13T14:16:03.156986346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwc7q,Uid:1325b8d0-8bdd-42ab-a504-b3b56836607d,Namespace:calico-system,Attempt:1,}" Dec 13 14:16:03.382829 systemd-networkd[1536]: vxlan.calico: Gained IPv6LL Dec 13 14:16:03.402881 systemd-networkd[1536]: calied760d415a8: Link UP Dec 13 14:16:03.409399 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:16:03.409733 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calied760d415a8: link becomes ready Dec 13 14:16:03.410006 systemd-networkd[1536]: calied760d415a8: Gained carrier Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.255 [INFO][3209] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.32-k8s-csi--node--driver--lwc7q-eth0 csi-node-driver- calico-system 1325b8d0-8bdd-42ab-a504-b3b56836607d 1061 0 2024-12-13 14:15:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.29.32 csi-node-driver-lwc7q eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calied760d415a8 [] []}} ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.255 [INFO][3209] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.326 [INFO][3222] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" HandleID="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.343 [INFO][3222] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" HandleID="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f32d0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.29.32", "pod":"csi-node-driver-lwc7q", "timestamp":"2024-12-13 14:16:03.326403935 +0000 UTC"}, Hostname:"172.31.29.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.343 [INFO][3222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.343 [INFO][3222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.343 [INFO][3222] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.32' Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.346 [INFO][3222] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.353 [INFO][3222] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.360 [INFO][3222] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.364 [INFO][3222] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.368 [INFO][3222] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.369 [INFO][3222] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.372 [INFO][3222] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.378 [INFO][3222] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.392 [INFO][3222] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.193/26] block=192.168.51.192/26 handle="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.392 [INFO][3222] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.193/26] handle="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" host="172.31.29.32" Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.392 [INFO][3222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:03.432611 env[1822]: 2024-12-13 14:16:03.392 [INFO][3222] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.193/26] IPv6=[] ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" HandleID="k8s-pod-network.cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.433872 env[1822]: 2024-12-13 14:16:03.396 [INFO][3209] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-csi--node--driver--lwc7q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1325b8d0-8bdd-42ab-a504-b3b56836607d", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"", Pod:"csi-node-driver-lwc7q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied760d415a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:03.433872 env[1822]: 2024-12-13 14:16:03.396 [INFO][3209] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.193/32] ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.433872 env[1822]: 2024-12-13 14:16:03.396 [INFO][3209] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calied760d415a8 ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.433872 env[1822]: 2024-12-13 14:16:03.411 [INFO][3209] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.433872 env[1822]: 2024-12-13 14:16:03.412 [INFO][3209] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-csi--node--driver--lwc7q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1325b8d0-8bdd-42ab-a504-b3b56836607d", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb", Pod:"csi-node-driver-lwc7q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied760d415a8", MAC:"92:c9:19:93:ec:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:03.433872 env[1822]: 2024-12-13 14:16:03.427 [INFO][3209] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb" Namespace="calico-system" Pod="csi-node-driver-lwc7q" WorkloadEndpoint="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:03.452000 audit[3243]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:03.452000 audit[3243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffffb266e0 a2=0 a3=ffff979e5fa8 items=0 ppid=2909 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:03.458005 env[1822]: time="2024-12-13T14:16:03.457848605Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:03.458447 env[1822]: time="2024-12-13T14:16:03.458326699Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:03.458707 env[1822]: time="2024-12-13T14:16:03.458623239Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:03.460451 env[1822]: time="2024-12-13T14:16:03.459316314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb pid=3252 runtime=io.containerd.runc.v2 Dec 13 14:16:03.504869 systemd[1]: Started cri-containerd-cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb.scope. Dec 13 14:16:03.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.556000 audit: BPF prog-id=103 op=LOAD Dec 13 14:16:03.558000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.558000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3252 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832613837616464636235636261303636356563373337306534 Dec 13 14:16:03.558000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.558000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3252 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832613837616464636235636261303636356563373337306534 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.559000 audit: BPF prog-id=104 op=LOAD Dec 13 14:16:03.559000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3252 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832613837616464636235636261303636356563373337306534 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.561000 audit: BPF prog-id=105 op=LOAD Dec 13 14:16:03.561000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3252 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832613837616464636235636261303636356563373337306534 Dec 13 14:16:03.563000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:16:03.563000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:03.563000 audit: BPF prog-id=106 op=LOAD Dec 13 14:16:03.563000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3252 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832613837616464636235636261303636356563373337306534 Dec 13 14:16:03.590186 env[1822]: time="2024-12-13T14:16:03.590114671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwc7q,Uid:1325b8d0-8bdd-42ab-a504-b3b56836607d,Namespace:calico-system,Attempt:1,} returns sandbox id \"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb\"" Dec 13 14:16:03.592783 env[1822]: time="2024-12-13T14:16:03.592696740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:16:03.632622 kubelet[2217]: E1213 14:16:03.632518 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:04.153677 systemd[1]: run-containerd-runc-k8s.io-cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb-runc.wUmdU6.mount: Deactivated successfully. Dec 13 14:16:04.633356 kubelet[2217]: E1213 14:16:04.633298 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:05.208460 env[1822]: time="2024-12-13T14:16:05.208371587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.243563 env[1822]: time="2024-12-13T14:16:05.243485495Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.259177 env[1822]: time="2024-12-13T14:16:05.259109482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.315134 env[1822]: time="2024-12-13T14:16:05.315078692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.316887 env[1822]: time="2024-12-13T14:16:05.316811014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:16:05.324403 env[1822]: time="2024-12-13T14:16:05.323066444Z" level=info msg="CreateContainer within sandbox \"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:16:05.366616 systemd-networkd[1536]: calied760d415a8: Gained IPv6LL Dec 13 14:16:05.495046 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1285889349.mount: Deactivated successfully. Dec 13 14:16:05.532032 env[1822]: time="2024-12-13T14:16:05.531951714Z" level=info msg="CreateContainer within sandbox \"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d5956dd36b5b41ceb8b53c486550407594c8fdbf65313508076e4bc47333d798\"" Dec 13 14:16:05.533425 env[1822]: time="2024-12-13T14:16:05.533372691Z" level=info msg="StartContainer for \"d5956dd36b5b41ceb8b53c486550407594c8fdbf65313508076e4bc47333d798\"" Dec 13 14:16:05.585955 systemd[1]: run-containerd-runc-k8s.io-d5956dd36b5b41ceb8b53c486550407594c8fdbf65313508076e4bc47333d798-runc.nBi3M4.mount: Deactivated successfully. Dec 13 14:16:05.590551 systemd[1]: Started cri-containerd-d5956dd36b5b41ceb8b53c486550407594c8fdbf65313508076e4bc47333d798.scope. Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3252 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:05.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393536646433366235623431636562386235336334383635353034 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit: BPF prog-id=107 op=LOAD Dec 13 14:16:05.625000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3252 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:05.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393536646433366235623431636562386235336334383635353034 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit: BPF prog-id=108 op=LOAD Dec 13 14:16:05.625000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3252 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:05.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393536646433366235623431636562386235336334383635353034 Dec 13 14:16:05.625000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:16:05.625000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:05.625000 audit: BPF prog-id=109 op=LOAD Dec 13 14:16:05.625000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3252 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:05.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393536646433366235623431636562386235336334383635353034 Dec 13 14:16:05.633920 kubelet[2217]: E1213 14:16:05.633846 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:05.659922 env[1822]: time="2024-12-13T14:16:05.659843303Z" level=info msg="StartContainer for \"d5956dd36b5b41ceb8b53c486550407594c8fdbf65313508076e4bc47333d798\" returns successfully" Dec 13 14:16:05.663073 env[1822]: time="2024-12-13T14:16:05.662979306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:16:06.634270 kubelet[2217]: E1213 14:16:06.634179 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:07.237175 env[1822]: time="2024-12-13T14:16:07.237082335Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.240196 env[1822]: time="2024-12-13T14:16:07.240132116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.243223 env[1822]: time="2024-12-13T14:16:07.243171455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.245918 env[1822]: time="2024-12-13T14:16:07.245871321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.246916 env[1822]: time="2024-12-13T14:16:07.246870283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:16:07.251582 env[1822]: time="2024-12-13T14:16:07.251508254Z" level=info msg="CreateContainer within sandbox \"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:16:07.276006 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2927942438.mount: Deactivated successfully. Dec 13 14:16:07.284743 env[1822]: time="2024-12-13T14:16:07.284662023Z" level=info msg="CreateContainer within sandbox \"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"cf0723011d3b579adf4d4de6b6062e00d36df29aa7d214c38f1d93e78531944f\"" Dec 13 14:16:07.285775 env[1822]: time="2024-12-13T14:16:07.285692180Z" level=info msg="StartContainer for \"cf0723011d3b579adf4d4de6b6062e00d36df29aa7d214c38f1d93e78531944f\"" Dec 13 14:16:07.324318 systemd[1]: Started cri-containerd-cf0723011d3b579adf4d4de6b6062e00d36df29aa7d214c38f1d93e78531944f.scope. Dec 13 14:16:07.335285 systemd[1]: run-containerd-runc-k8s.io-cf0723011d3b579adf4d4de6b6062e00d36df29aa7d214c38f1d93e78531944f-runc.W6OcGR.mount: Deactivated successfully. Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.377647 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 14:16:07.377751 kernel: audit: type=1400 audit(1734099367.374:706): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3252 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:07.394998 kernel: audit: type=1300 audit(1734099367.374:706): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3252 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:07.395111 kernel: audit: type=1327 audit(1734099367.374:706): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303732333031316433623537396164663464346465366236303632 Dec 13 14:16:07.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303732333031316433623537396164663464346465366236303632 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.411361 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.418356 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.426598 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.435562 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.442933 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.457922 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.458075 kernel: audit: type=1400 audit(1734099367.374:707): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.374000 audit: BPF prog-id=110 op=LOAD Dec 13 14:16:07.374000 audit[3330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3252 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:07.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303732333031316433623537396164663464346465366236303632 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.376000 audit: BPF prog-id=111 op=LOAD Dec 13 14:16:07.376000 audit[3330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3252 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:07.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303732333031316433623537396164663464346465366236303632 Dec 13 14:16:07.383000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:16:07.383000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.383000 audit: BPF prog-id=112 op=LOAD Dec 13 14:16:07.383000 audit[3330]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3252 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:07.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303732333031316433623537396164663464346465366236303632 Dec 13 14:16:07.463370 env[1822]: time="2024-12-13T14:16:07.462323153Z" level=info msg="StartContainer for \"cf0723011d3b579adf4d4de6b6062e00d36df29aa7d214c38f1d93e78531944f\" returns successfully" Dec 13 14:16:07.634794 kubelet[2217]: E1213 14:16:07.634630 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:07.808596 kubelet[2217]: I1213 14:16:07.808542 2217 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:16:07.808797 kubelet[2217]: I1213 14:16:07.808621 2217 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:16:08.125527 kubelet[2217]: I1213 14:16:08.125487 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-lwc7q" podStartSLOduration=32.470123183 podStartE2EDuration="36.125433849s" podCreationTimestamp="2024-12-13 14:15:32 +0000 UTC" firstStartedPulling="2024-12-13 14:16:03.592017456 +0000 UTC m=+33.161284191" lastFinishedPulling="2024-12-13 14:16:07.247328122 +0000 UTC m=+36.816594857" observedRunningTime="2024-12-13 14:16:08.125005671 +0000 UTC m=+37.694272430" watchObservedRunningTime="2024-12-13 14:16:08.125433849 +0000 UTC m=+37.694700596" Dec 13 14:16:08.635648 kubelet[2217]: E1213 14:16:08.635565 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:08.971525 env[1822]: time="2024-12-13T14:16:08.971455923Z" level=info msg="StopPodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\"" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.054 [INFO][3404] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.054 [INFO][3404] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" iface="eth0" netns="/var/run/netns/cni-2c58ef8f-0512-fe02-ae15-7578b686a316" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.054 [INFO][3404] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" iface="eth0" netns="/var/run/netns/cni-2c58ef8f-0512-fe02-ae15-7578b686a316" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.056 [INFO][3404] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" iface="eth0" netns="/var/run/netns/cni-2c58ef8f-0512-fe02-ae15-7578b686a316" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.056 [INFO][3404] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.056 [INFO][3404] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.091 [INFO][3410] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.091 [INFO][3410] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.092 [INFO][3410] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.113 [WARNING][3410] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.113 [INFO][3410] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.126 [INFO][3410] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:09.130847 env[1822]: 2024-12-13 14:16:09.128 [INFO][3404] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:09.135132 systemd[1]: run-netns-cni\x2d2c58ef8f\x2d0512\x2dfe02\x2dae15\x2d7578b686a316.mount: Deactivated successfully. Dec 13 14:16:09.138245 env[1822]: time="2024-12-13T14:16:09.135535440Z" level=info msg="TearDown network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" successfully" Dec 13 14:16:09.138245 env[1822]: time="2024-12-13T14:16:09.135592342Z" level=info msg="StopPodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" returns successfully" Dec 13 14:16:09.138943 env[1822]: time="2024-12-13T14:16:09.138893997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zq45c,Uid:4233f08c-e62f-461a-9e9b-5b1b732184dd,Namespace:default,Attempt:1,}" Dec 13 14:16:09.386884 systemd-networkd[1536]: cali9aa4d2d5bb1: Link UP Dec 13 14:16:09.395790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:16:09.395962 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9aa4d2d5bb1: link becomes ready Dec 13 14:16:09.390015 (udev-worker)[3434]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:09.395327 systemd-networkd[1536]: cali9aa4d2d5bb1: Gained carrier Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.248 [INFO][3416] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0 nginx-deployment-6d5f899847- default 4233f08c-e62f-461a-9e9b-5b1b732184dd 1096 0 2024-12-13 14:15:52 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.32 nginx-deployment-6d5f899847-zq45c eth0 default [] [] [kns.default ksa.default.default] cali9aa4d2d5bb1 [] []}} ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.249 [INFO][3416] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.305 [INFO][3428] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" HandleID="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.324 [INFO][3428] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" HandleID="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316ad0), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.32", "pod":"nginx-deployment-6d5f899847-zq45c", "timestamp":"2024-12-13 14:16:09.305102571 +0000 UTC"}, Hostname:"172.31.29.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.324 [INFO][3428] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.324 [INFO][3428] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.324 [INFO][3428] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.32' Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.328 [INFO][3428] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.335 [INFO][3428] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.343 [INFO][3428] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.346 [INFO][3428] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.350 [INFO][3428] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.350 [INFO][3428] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.353 [INFO][3428] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05 Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.365 [INFO][3428] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.375 [INFO][3428] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.194/26] block=192.168.51.192/26 handle="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.375 [INFO][3428] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.194/26] handle="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" host="172.31.29.32" Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.375 [INFO][3428] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:09.430994 env[1822]: 2024-12-13 14:16:09.375 [INFO][3428] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.194/26] IPv6=[] ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" HandleID="k8s-pod-network.e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.432273 env[1822]: 2024-12-13 14:16:09.378 [INFO][3416] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4233f08c-e62f-461a-9e9b-5b1b732184dd", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"", Pod:"nginx-deployment-6d5f899847-zq45c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9aa4d2d5bb1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:09.432273 env[1822]: 2024-12-13 14:16:09.378 [INFO][3416] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.194/32] ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.432273 env[1822]: 2024-12-13 14:16:09.378 [INFO][3416] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9aa4d2d5bb1 ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.432273 env[1822]: 2024-12-13 14:16:09.395 [INFO][3416] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.432273 env[1822]: 2024-12-13 14:16:09.397 [INFO][3416] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4233f08c-e62f-461a-9e9b-5b1b732184dd", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05", Pod:"nginx-deployment-6d5f899847-zq45c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9aa4d2d5bb1", MAC:"9a:bb:56:4f:ca:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:09.432273 env[1822]: 2024-12-13 14:16:09.411 [INFO][3416] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05" Namespace="default" Pod="nginx-deployment-6d5f899847-zq45c" WorkloadEndpoint="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:09.439000 audit[3445]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:09.439000 audit[3445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=fffff4fb9860 a2=0 a3=ffffb3cb7fa8 items=0 ppid=2909 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:09.456158 env[1822]: time="2024-12-13T14:16:09.455999237Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:09.456329 env[1822]: time="2024-12-13T14:16:09.456191427Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:09.456329 env[1822]: time="2024-12-13T14:16:09.456277014Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:09.458133 env[1822]: time="2024-12-13T14:16:09.456707889Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05 pid=3458 runtime=io.containerd.runc.v2 Dec 13 14:16:09.503623 systemd[1]: run-containerd-runc-k8s.io-e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05-runc.jnMkoA.mount: Deactivated successfully. Dec 13 14:16:09.510814 systemd[1]: Started cri-containerd-e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05.scope. Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.529000 audit: BPF prog-id=113 op=LOAD Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3458 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303365363038396239646235333638323166313037363338646332 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3458 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303365363038396239646235333638323166313037363338646332 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit: BPF prog-id=114 op=LOAD Dec 13 14:16:09.530000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3458 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303365363038396239646235333638323166313037363338646332 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.530000 audit: BPF prog-id=115 op=LOAD Dec 13 14:16:09.530000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3458 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303365363038396239646235333638323166313037363338646332 Dec 13 14:16:09.530000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:16:09.530000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.531000 audit: BPF prog-id=116 op=LOAD Dec 13 14:16:09.531000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3458 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303365363038396239646235333638323166313037363338646332 Dec 13 14:16:09.573251 env[1822]: time="2024-12-13T14:16:09.573195255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zq45c,Uid:4233f08c-e62f-461a-9e9b-5b1b732184dd,Namespace:default,Attempt:1,} returns sandbox id \"e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05\"" Dec 13 14:16:09.576109 env[1822]: time="2024-12-13T14:16:09.575996567Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:16:09.636266 kubelet[2217]: E1213 14:16:09.636208 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:10.028113 amazon-ssm-agent[1796]: 2024-12-13 14:16:10 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:16:10.636984 kubelet[2217]: E1213 14:16:10.636904 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:10.808111 systemd-networkd[1536]: cali9aa4d2d5bb1: Gained IPv6LL Dec 13 14:16:11.637298 kubelet[2217]: E1213 14:16:11.637217 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:12.607532 kubelet[2217]: E1213 14:16:12.607437 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:12.638013 kubelet[2217]: E1213 14:16:12.637924 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:13.559849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2772557182.mount: Deactivated successfully. Dec 13 14:16:13.638469 kubelet[2217]: E1213 14:16:13.638392 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:14.638922 kubelet[2217]: E1213 14:16:14.638849 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:15.639749 kubelet[2217]: E1213 14:16:15.639688 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:15.881618 env[1822]: time="2024-12-13T14:16:15.881529312Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:15.885589 env[1822]: time="2024-12-13T14:16:15.885521441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:15.889282 env[1822]: time="2024-12-13T14:16:15.889214778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:15.892741 env[1822]: time="2024-12-13T14:16:15.892584178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:15.894723 env[1822]: time="2024-12-13T14:16:15.894663306Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:16:15.899318 env[1822]: time="2024-12-13T14:16:15.899261914Z" level=info msg="CreateContainer within sandbox \"e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:16:15.925102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount765532757.mount: Deactivated successfully. Dec 13 14:16:15.938858 env[1822]: time="2024-12-13T14:16:15.938580388Z" level=info msg="CreateContainer within sandbox \"e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b74844a7795e36eafcf75f04d540c66cdc964c4d5ad69978bc2af8b7a31d97a9\"" Dec 13 14:16:15.939974 env[1822]: time="2024-12-13T14:16:15.939907169Z" level=info msg="StartContainer for \"b74844a7795e36eafcf75f04d540c66cdc964c4d5ad69978bc2af8b7a31d97a9\"" Dec 13 14:16:15.943131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2660970059.mount: Deactivated successfully. Dec 13 14:16:15.983514 systemd[1]: Started cri-containerd-b74844a7795e36eafcf75f04d540c66cdc964c4d5ad69978bc2af8b7a31d97a9.scope. Dec 13 14:16:16.016328 kernel: kauditd_printk_skb: 93 callbacks suppressed Dec 13 14:16:16.016519 kernel: audit: type=1400 audit(1734099376.012:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.030566 kernel: audit: type=1400 audit(1734099376.012:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.037938 kernel: audit: type=1400 audit(1734099376.012:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.053200 kernel: audit: type=1400 audit(1734099376.012:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.053359 kernel: audit: type=1400 audit(1734099376.012:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.060860 kernel: audit: type=1400 audit(1734099376.012:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.069477 kernel: audit: type=1400 audit(1734099376.012:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.069594 kernel: audit: type=1400 audit(1734099376.012:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.085225 kernel: audit: type=1400 audit(1734099376.012:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.085396 kernel: audit: type=1400 audit(1734099376.014:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.014000 audit: BPF prog-id=117 op=LOAD Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3458 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:16.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237343834346137373935653336656166636637356630346435343063 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3458 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:16.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237343834346137373935653336656166636637356630346435343063 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.022000 audit: BPF prog-id=118 op=LOAD Dec 13 14:16:16.022000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3458 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:16.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237343834346137373935653336656166636637356630346435343063 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit: BPF prog-id=119 op=LOAD Dec 13 14:16:16.029000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3458 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:16.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237343834346137373935653336656166636637356630346435343063 Dec 13 14:16:16.029000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:16:16.029000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:16.029000 audit: BPF prog-id=120 op=LOAD Dec 13 14:16:16.029000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3458 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:16.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237343834346137373935653336656166636637356630346435343063 Dec 13 14:16:16.103732 env[1822]: time="2024-12-13T14:16:16.102332326Z" level=info msg="StartContainer for \"b74844a7795e36eafcf75f04d540c66cdc964c4d5ad69978bc2af8b7a31d97a9\" returns successfully" Dec 13 14:16:16.640547 kubelet[2217]: E1213 14:16:16.640411 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:17.640935 kubelet[2217]: E1213 14:16:17.640862 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:18.641310 kubelet[2217]: E1213 14:16:18.641241 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:19.641788 kubelet[2217]: E1213 14:16:19.641686 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:20.642817 kubelet[2217]: E1213 14:16:20.642715 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:21.643957 kubelet[2217]: E1213 14:16:21.643855 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:22.645126 kubelet[2217]: E1213 14:16:22.645059 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:23.645482 kubelet[2217]: E1213 14:16:23.645413 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:24.646009 kubelet[2217]: E1213 14:16:24.645946 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:24.856000 audit[3568]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.859974 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:16:24.860117 kernel: audit: type=1325 audit(1734099384.856:749): table=filter:83 family=2 entries=20 op=nft_register_rule pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.856000 audit[3568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff43647f0 a2=0 a3=1 items=0 ppid=2369 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.875966 kernel: audit: type=1300 audit(1734099384.856:749): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff43647f0 a2=0 a3=1 items=0 ppid=2369 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.876387 kernel: audit: type=1327 audit(1734099384.856:749): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.864000 audit[3568]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.886504 kernel: audit: type=1325 audit(1734099384.864:750): table=nat:84 family=2 entries=22 op=nft_register_rule pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.886613 kernel: audit: type=1300 audit(1734099384.864:750): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff43647f0 a2=0 a3=1 items=0 ppid=2369 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.864000 audit[3568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff43647f0 a2=0 a3=1 items=0 ppid=2369 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.903042 kernel: audit: type=1327 audit(1734099384.864:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.910000 audit[3570]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.910000 audit[3570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd805fd20 a2=0 a3=1 items=0 ppid=2369 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.927931 kernel: audit: type=1325 audit(1734099384.910:751): table=filter:85 family=2 entries=32 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.928039 kernel: audit: type=1300 audit(1734099384.910:751): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd805fd20 a2=0 a3=1 items=0 ppid=2369 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.928091 kernel: audit: type=1327 audit(1734099384.910:751): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.926000 audit[3570]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.938077 kernel: audit: type=1325 audit(1734099384.926:752): table=nat:86 family=2 entries=22 op=nft_register_rule pid=3570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.926000 audit[3570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd805fd20 a2=0 a3=1 items=0 ppid=2369 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.994787 kubelet[2217]: I1213 14:16:24.994697 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-zq45c" podStartSLOduration=26.674816014 podStartE2EDuration="32.994601591s" podCreationTimestamp="2024-12-13 14:15:52 +0000 UTC" firstStartedPulling="2024-12-13 14:16:09.575422327 +0000 UTC m=+39.144689038" lastFinishedPulling="2024-12-13 14:16:15.895207892 +0000 UTC m=+45.464474615" observedRunningTime="2024-12-13 14:16:16.154855846 +0000 UTC m=+45.724122581" watchObservedRunningTime="2024-12-13 14:16:24.994601591 +0000 UTC m=+54.563868314" Dec 13 14:16:24.995028 kubelet[2217]: I1213 14:16:24.994940 2217 topology_manager.go:215] "Topology Admit Handler" podUID="6fa286b2-5f4e-413f-bc12-14bcec61bda1" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:16:25.006120 systemd[1]: Created slice kubepods-besteffort-pod6fa286b2_5f4e_413f_bc12_14bcec61bda1.slice. Dec 13 14:16:25.014505 kubelet[2217]: I1213 14:16:25.014450 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6fa286b2-5f4e-413f-bc12-14bcec61bda1-data\") pod \"nfs-server-provisioner-0\" (UID: \"6fa286b2-5f4e-413f-bc12-14bcec61bda1\") " pod="default/nfs-server-provisioner-0" Dec 13 14:16:25.014808 kubelet[2217]: I1213 14:16:25.014779 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p28h6\" (UniqueName: \"kubernetes.io/projected/6fa286b2-5f4e-413f-bc12-14bcec61bda1-kube-api-access-p28h6\") pod \"nfs-server-provisioner-0\" (UID: \"6fa286b2-5f4e-413f-bc12-14bcec61bda1\") " pod="default/nfs-server-provisioner-0" Dec 13 14:16:25.314135 env[1822]: time="2024-12-13T14:16:25.313434351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6fa286b2-5f4e-413f-bc12-14bcec61bda1,Namespace:default,Attempt:0,}" Dec 13 14:16:25.558051 systemd-networkd[1536]: cali60e51b789ff: Link UP Dec 13 14:16:25.562263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:16:25.562568 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:16:25.562904 systemd-networkd[1536]: cali60e51b789ff: Gained carrier Dec 13 14:16:25.568575 (udev-worker)[3592]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.427 [INFO][3573] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.32-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6fa286b2-5f4e-413f-bc12-14bcec61bda1 1167 0 2024-12-13 14:16:24 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.29.32 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.427 [INFO][3573] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.473 [INFO][3585] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" HandleID="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Workload="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.495 [INFO][3585] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" HandleID="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Workload="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318af0), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.32", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:16:25.4733007 +0000 UTC"}, Hostname:"172.31.29.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.495 [INFO][3585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.495 [INFO][3585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.495 [INFO][3585] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.32' Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.498 [INFO][3585] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.505 [INFO][3585] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.512 [INFO][3585] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.516 [INFO][3585] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.524 [INFO][3585] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.524 [INFO][3585] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.529 [INFO][3585] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3 Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.538 [INFO][3585] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.551 [INFO][3585] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.195/26] block=192.168.51.192/26 handle="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.551 [INFO][3585] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.195/26] handle="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" host="172.31.29.32" Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.551 [INFO][3585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:25.587572 env[1822]: 2024-12-13 14:16:25.551 [INFO][3585] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.195/26] IPv6=[] ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" HandleID="k8s-pod-network.d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Workload="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.589188 env[1822]: 2024-12-13 14:16:25.554 [INFO][3573] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6fa286b2-5f4e-413f-bc12-14bcec61bda1", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:25.589188 env[1822]: 2024-12-13 14:16:25.554 [INFO][3573] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.195/32] ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.589188 env[1822]: 2024-12-13 14:16:25.555 [INFO][3573] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.589188 env[1822]: 2024-12-13 14:16:25.563 [INFO][3573] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.589602 env[1822]: 2024-12-13 14:16:25.566 [INFO][3573] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6fa286b2-5f4e-413f-bc12-14bcec61bda1", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"de:f6:4c:2d:47:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:25.589602 env[1822]: 2024-12-13 14:16:25.582 [INFO][3573] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.29.32-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:25.610680 env[1822]: time="2024-12-13T14:16:25.610556674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:25.610680 env[1822]: time="2024-12-13T14:16:25.610634754Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:25.611222 env[1822]: time="2024-12-13T14:16:25.611113385Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:25.611773 env[1822]: time="2024-12-13T14:16:25.611667360Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3 pid=3612 runtime=io.containerd.runc.v2 Dec 13 14:16:25.646544 kubelet[2217]: E1213 14:16:25.646451 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:25.663000 audit[3637]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:25.663000 audit[3637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffe5d0df90 a2=0 a3=ffff98095fa8 items=0 ppid=2909 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.663000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:25.666712 systemd[1]: Started cri-containerd-d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3.scope. Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.693000 audit: BPF prog-id=121 op=LOAD Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3612 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434666433376630343565316531326436343030616362663665306237 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3612 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434666433376630343565316531326436343030616362663665306237 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit: BPF prog-id=122 op=LOAD Dec 13 14:16:25.694000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3612 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434666433376630343565316531326436343030616362663665306237 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.694000 audit: BPF prog-id=123 op=LOAD Dec 13 14:16:25.694000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3612 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434666433376630343565316531326436343030616362663665306237 Dec 13 14:16:25.695000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:16:25.695000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.695000 audit: BPF prog-id=124 op=LOAD Dec 13 14:16:25.695000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3612 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434666433376630343565316531326436343030616362663665306237 Dec 13 14:16:25.737798 env[1822]: time="2024-12-13T14:16:25.737730585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6fa286b2-5f4e-413f-bc12-14bcec61bda1,Namespace:default,Attempt:0,} returns sandbox id \"d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3\"" Dec 13 14:16:25.740627 env[1822]: time="2024-12-13T14:16:25.740568193Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:16:26.147166 systemd[1]: run-containerd-runc-k8s.io-d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3-runc.zGKbuO.mount: Deactivated successfully. Dec 13 14:16:26.647593 kubelet[2217]: E1213 14:16:26.647526 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:26.870565 systemd-networkd[1536]: cali60e51b789ff: Gained IPv6LL Dec 13 14:16:27.648521 kubelet[2217]: E1213 14:16:27.648445 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:28.649250 kubelet[2217]: E1213 14:16:28.649181 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:29.349374 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3393230058.mount: Deactivated successfully. Dec 13 14:16:29.649543 kubelet[2217]: E1213 14:16:29.649367 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:30.650465 kubelet[2217]: E1213 14:16:30.650415 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:31.652219 kubelet[2217]: E1213 14:16:31.652109 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:32.607423 kubelet[2217]: E1213 14:16:32.607277 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:32.632854 env[1822]: time="2024-12-13T14:16:32.632784301Z" level=info msg="StopPodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\"" Dec 13 14:16:32.652427 kubelet[2217]: E1213 14:16:32.652281 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.735 [WARNING][3666] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-csi--node--driver--lwc7q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1325b8d0-8bdd-42ab-a504-b3b56836607d", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb", Pod:"csi-node-driver-lwc7q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied760d415a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.736 [INFO][3666] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.736 [INFO][3666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" iface="eth0" netns="" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.736 [INFO][3666] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.736 [INFO][3666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.808 [INFO][3673] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.808 [INFO][3673] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.808 [INFO][3673] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.821 [WARNING][3673] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.821 [INFO][3673] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.824 [INFO][3673] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:32.828964 env[1822]: 2024-12-13 14:16:32.826 [INFO][3666] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:32.830067 env[1822]: time="2024-12-13T14:16:32.829007045Z" level=info msg="TearDown network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" successfully" Dec 13 14:16:32.830067 env[1822]: time="2024-12-13T14:16:32.829063714Z" level=info msg="StopPodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" returns successfully" Dec 13 14:16:32.830639 env[1822]: time="2024-12-13T14:16:32.830573572Z" level=info msg="RemovePodSandbox for \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\"" Dec 13 14:16:32.830934 env[1822]: time="2024-12-13T14:16:32.830854239Z" level=info msg="Forcibly stopping sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\"" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:32.958 [WARNING][3695] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-csi--node--driver--lwc7q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1325b8d0-8bdd-42ab-a504-b3b56836607d", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"cee82a87addcb5cba0665ec7370e48a264b762ba881878361ad8d8fdeeed01fb", Pod:"csi-node-driver-lwc7q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied760d415a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:32.958 [INFO][3695] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:32.958 [INFO][3695] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" iface="eth0" netns="" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:32.958 [INFO][3695] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:32.959 [INFO][3695] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.012 [INFO][3701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.012 [INFO][3701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.012 [INFO][3701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.026 [WARNING][3701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.026 [INFO][3701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" HandleID="k8s-pod-network.39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Workload="172.31.29.32-k8s-csi--node--driver--lwc7q-eth0" Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.031 [INFO][3701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:33.035772 env[1822]: 2024-12-13 14:16:33.033 [INFO][3695] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3" Dec 13 14:16:33.036967 env[1822]: time="2024-12-13T14:16:33.036904857Z" level=info msg="TearDown network for sandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" successfully" Dec 13 14:16:33.042529 env[1822]: time="2024-12-13T14:16:33.042462440Z" level=info msg="RemovePodSandbox \"39e82a6acb4f65f6abf348e3dfcf6c76909561da18a777a7f0e0a708922877c3\" returns successfully" Dec 13 14:16:33.043663 env[1822]: time="2024-12-13T14:16:33.043604333Z" level=info msg="StopPodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\"" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.145 [WARNING][3724] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4233f08c-e62f-461a-9e9b-5b1b732184dd", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05", Pod:"nginx-deployment-6d5f899847-zq45c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9aa4d2d5bb1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.145 [INFO][3724] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.145 [INFO][3724] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" iface="eth0" netns="" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.145 [INFO][3724] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.145 [INFO][3724] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.203 [INFO][3730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.203 [INFO][3730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.203 [INFO][3730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.215 [WARNING][3730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.215 [INFO][3730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.218 [INFO][3730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:33.223939 env[1822]: 2024-12-13 14:16:33.221 [INFO][3724] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.225265 env[1822]: time="2024-12-13T14:16:33.223967802Z" level=info msg="TearDown network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" successfully" Dec 13 14:16:33.225265 env[1822]: time="2024-12-13T14:16:33.224023690Z" level=info msg="StopPodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" returns successfully" Dec 13 14:16:33.226000 env[1822]: time="2024-12-13T14:16:33.225940499Z" level=info msg="RemovePodSandbox for \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\"" Dec 13 14:16:33.226251 env[1822]: time="2024-12-13T14:16:33.226173930Z" level=info msg="Forcibly stopping sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\"" Dec 13 14:16:33.401827 env[1822]: time="2024-12-13T14:16:33.401638406Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.330 [WARNING][3750] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4233f08c-e62f-461a-9e9b-5b1b732184dd", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"e103e6089b9db536821f107638dc201546ff1af08fa5c8ac7225ae04899b6c05", Pod:"nginx-deployment-6d5f899847-zq45c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9aa4d2d5bb1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.331 [INFO][3750] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.331 [INFO][3750] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" iface="eth0" netns="" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.331 [INFO][3750] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.331 [INFO][3750] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.381 [INFO][3756] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.382 [INFO][3756] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.382 [INFO][3756] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.395 [WARNING][3756] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.395 [INFO][3756] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" HandleID="k8s-pod-network.63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Workload="172.31.29.32-k8s-nginx--deployment--6d5f899847--zq45c-eth0" Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.398 [INFO][3756] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:33.403543 env[1822]: 2024-12-13 14:16:33.400 [INFO][3750] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832" Dec 13 14:16:33.404856 env[1822]: time="2024-12-13T14:16:33.404718050Z" level=info msg="TearDown network for sandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" successfully" Dec 13 14:16:33.412771 env[1822]: time="2024-12-13T14:16:33.412676945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:33.413122 env[1822]: time="2024-12-13T14:16:33.413065069Z" level=info msg="RemovePodSandbox \"63da6c3d51ac60aac043d7844f99c55eda902cdbd32f88b978daeb80179cc832\" returns successfully" Dec 13 14:16:33.418663 env[1822]: time="2024-12-13T14:16:33.416592806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:33.422940 env[1822]: time="2024-12-13T14:16:33.422862467Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 14:16:33.423428 env[1822]: time="2024-12-13T14:16:33.421074620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:33.429670 env[1822]: time="2024-12-13T14:16:33.429580028Z" level=info msg="CreateContainer within sandbox \"d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:16:33.453580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount167806544.mount: Deactivated successfully. Dec 13 14:16:33.470630 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3284669716.mount: Deactivated successfully. Dec 13 14:16:33.480192 env[1822]: time="2024-12-13T14:16:33.480119332Z" level=info msg="CreateContainer within sandbox \"d4fd37f045e1e12d6400acbf6e0b7b3d6a4a6e20362909457f8b325a02ec65f3\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"dfa87fdcd96fb20b794b789c9e7e8d6190d80dc0be0b4196558f7ee2077612d6\"" Dec 13 14:16:33.481714 env[1822]: time="2024-12-13T14:16:33.481630112Z" level=info msg="StartContainer for \"dfa87fdcd96fb20b794b789c9e7e8d6190d80dc0be0b4196558f7ee2077612d6\"" Dec 13 14:16:33.524650 systemd[1]: Started cri-containerd-dfa87fdcd96fb20b794b789c9e7e8d6190d80dc0be0b4196558f7ee2077612d6.scope. Dec 13 14:16:33.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.560740 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:16:33.560873 kernel: audit: type=1400 audit(1734099393.557:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574915 kernel: audit: type=1400 audit(1734099393.563:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.583793 kernel: audit: type=1400 audit(1734099393.563:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.584538 kernel: audit: type=1400 audit(1734099393.563:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.591700 kernel: audit: type=1400 audit(1734099393.563:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.606811 kernel: audit: type=1400 audit(1734099393.563:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.614577 kernel: audit: type=1400 audit(1734099393.563:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.622398 kernel: audit: type=1400 audit(1734099393.563:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.633646 kernel: audit: type=1400 audit(1734099393.563:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.641058 kernel: audit: type=1400 audit(1734099393.566:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.566000 audit: BPF prog-id=125 op=LOAD Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=3612 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613837666463643936666232306237393462373839633965376538 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3612 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613837666463643936666232306237393462373839633965376538 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit: BPF prog-id=126 op=LOAD Dec 13 14:16:33.574000 audit[3770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3612 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613837666463643936666232306237393462373839633965376538 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit: BPF prog-id=127 op=LOAD Dec 13 14:16:33.574000 audit[3770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3612 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613837666463643936666232306237393462373839633965376538 Dec 13 14:16:33.574000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:16:33.574000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.574000 audit: BPF prog-id=128 op=LOAD Dec 13 14:16:33.574000 audit[3770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3612 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613837666463643936666232306237393462373839633965376538 Dec 13 14:16:33.654526 kubelet[2217]: E1213 14:16:33.653576 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:33.657160 env[1822]: time="2024-12-13T14:16:33.657086127Z" level=info msg="StartContainer for \"dfa87fdcd96fb20b794b789c9e7e8d6190d80dc0be0b4196558f7ee2077612d6\" returns successfully" Dec 13 14:16:33.773000 audit[3800]: AVC avc: denied { search } for pid=3800 comm="rpcbind" name="crypto" dev="proc" ino=18393 scontext=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:16:33.773000 audit[3800]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff85f5f000 a2=0 a3=0 items=0 ppid=3781 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 key=(null) Dec 13 14:16:33.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:16:33.859000 audit[3805]: AVC avc: denied { search } for pid=3805 comm="dbus-daemon" name="crypto" dev="proc" ino=18393 scontext=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:16:33.859000 audit[3805]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff90e6f000 a2=0 a3=0 items=0 ppid=3781 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 key=(null) Dec 13 14:16:33.859000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:16:33.867000 audit[3806]: AVC avc: denied { watch } for pid=3806 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538659 scontext=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c232,c943 tclass=dir permissive=0 Dec 13 14:16:33.867000 audit[3806]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaadd1c9a40 a2=2c8 a3=aaaadd1aea60 items=0 ppid=3781 pid=3806 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 key=(null) Dec 13 14:16:33.867000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:16:33.876000 audit[3807]: AVC avc: denied { read } for pid=3807 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18418 scontext=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:16:33.876000 audit[3807]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff9c46a570 a2=80000 a3=0 items=0 ppid=3781 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 key=(null) Dec 13 14:16:33.876000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:16:33.878000 audit[3807]: AVC avc: denied { search } for pid=3807 comm="ganesha.nfsd" name="crypto" dev="proc" ino=18393 scontext=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:16:33.878000 audit[3807]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9b7ff000 a2=0 a3=0 items=0 ppid=3781 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c232,c943 key=(null) Dec 13 14:16:33.878000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:16:34.217239 kubelet[2217]: I1213 14:16:34.217114 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.533369555 podStartE2EDuration="10.217052952s" podCreationTimestamp="2024-12-13 14:16:24 +0000 UTC" firstStartedPulling="2024-12-13 14:16:25.740017686 +0000 UTC m=+55.309284421" lastFinishedPulling="2024-12-13 14:16:33.423701095 +0000 UTC m=+62.992967818" observedRunningTime="2024-12-13 14:16:34.216952372 +0000 UTC m=+63.786219131" watchObservedRunningTime="2024-12-13 14:16:34.217052952 +0000 UTC m=+63.786319675" Dec 13 14:16:34.242000 audit[3812]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=3812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:34.242000 audit[3812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffea1b5910 a2=0 a3=1 items=0 ppid=2369 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:34.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:34.252000 audit[3812]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=3812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:34.252000 audit[3812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffea1b5910 a2=0 a3=1 items=0 ppid=2369 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:34.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:34.654826 kubelet[2217]: E1213 14:16:34.654668 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:35.655486 kubelet[2217]: E1213 14:16:35.655420 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:36.656478 kubelet[2217]: E1213 14:16:36.656397 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:37.657306 kubelet[2217]: E1213 14:16:37.657253 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:38.218252 systemd[1]: run-containerd-runc-k8s.io-d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58-runc.0iz0fi.mount: Deactivated successfully. Dec 13 14:16:38.658926 kubelet[2217]: E1213 14:16:38.658763 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:39.659325 kubelet[2217]: E1213 14:16:39.659221 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:40.659989 kubelet[2217]: E1213 14:16:40.659938 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:41.661197 kubelet[2217]: E1213 14:16:41.661137 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:42.662487 kubelet[2217]: E1213 14:16:42.662311 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:43.663135 kubelet[2217]: E1213 14:16:43.663029 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:44.664127 kubelet[2217]: E1213 14:16:44.664077 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:45.665965 kubelet[2217]: E1213 14:16:45.665920 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:46.667594 kubelet[2217]: E1213 14:16:46.667520 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:47.668194 kubelet[2217]: E1213 14:16:47.668150 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:48.669718 kubelet[2217]: E1213 14:16:48.669650 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:49.669844 kubelet[2217]: E1213 14:16:49.669765 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:50.670546 kubelet[2217]: E1213 14:16:50.670501 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:51.672230 kubelet[2217]: E1213 14:16:51.672165 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:52.607550 kubelet[2217]: E1213 14:16:52.607504 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:52.672440 kubelet[2217]: E1213 14:16:52.672396 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:53.673269 kubelet[2217]: E1213 14:16:53.673225 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:54.674657 kubelet[2217]: E1213 14:16:54.674608 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:55.675889 kubelet[2217]: E1213 14:16:55.675819 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:56.676428 kubelet[2217]: E1213 14:16:56.676381 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:57.677423 kubelet[2217]: E1213 14:16:57.677363 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:58.608092 kubelet[2217]: I1213 14:16:58.608027 2217 topology_manager.go:215] "Topology Admit Handler" podUID="9d2cfd07-b974-490f-9cf9-a417830d84f2" podNamespace="default" podName="test-pod-1" Dec 13 14:16:58.618836 systemd[1]: Created slice kubepods-besteffort-pod9d2cfd07_b974_490f_9cf9_a417830d84f2.slice. Dec 13 14:16:58.646043 kubelet[2217]: I1213 14:16:58.645994 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-951a56de-3980-4740-b1e4-9871cce06d80\" (UniqueName: \"kubernetes.io/nfs/9d2cfd07-b974-490f-9cf9-a417830d84f2-pvc-951a56de-3980-4740-b1e4-9871cce06d80\") pod \"test-pod-1\" (UID: \"9d2cfd07-b974-490f-9cf9-a417830d84f2\") " pod="default/test-pod-1" Dec 13 14:16:58.646468 kubelet[2217]: I1213 14:16:58.646428 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9l47g\" (UniqueName: \"kubernetes.io/projected/9d2cfd07-b974-490f-9cf9-a417830d84f2-kube-api-access-9l47g\") pod \"test-pod-1\" (UID: \"9d2cfd07-b974-490f-9cf9-a417830d84f2\") " pod="default/test-pod-1" Dec 13 14:16:58.677713 kubelet[2217]: E1213 14:16:58.677651 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:58.775000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.779859 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:16:58.780001 kernel: audit: type=1400 audit(1734099418.775:797): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.789017 kernel: Failed to create system directory netfs Dec 13 14:16:58.790928 kernel: Failed to create system directory netfs Dec 13 14:16:58.791060 kernel: audit: type=1400 audit(1734099418.775:797): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.775000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.800060 kernel: Failed to create system directory netfs Dec 13 14:16:58.800198 kernel: audit: type=1400 audit(1734099418.775:797): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.775000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.809307 kernel: Failed to create system directory netfs Dec 13 14:16:58.809486 kernel: audit: type=1400 audit(1734099418.775:797): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.775000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.775000 audit[3868]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab046ed5e0 a1=12c14 a2=aaaad575e028 a3=aaab046de010 items=0 ppid=581 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:58.829512 kernel: audit: type=1300 audit(1734099418.775:797): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab046ed5e0 a1=12c14 a2=aaaad575e028 a3=aaab046de010 items=0 ppid=581 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:58.829711 kernel: audit: type=1327 audit(1734099418.775:797): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:16:58.775000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.845916 kernel: Failed to create system directory fscache Dec 13 14:16:58.846069 kernel: audit: type=1400 audit(1734099418.823:798): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.846122 kernel: Failed to create system directory fscache Dec 13 14:16:58.846170 kernel: audit: type=1400 audit(1734099418.823:798): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.855372 kernel: Failed to create system directory fscache Dec 13 14:16:58.855510 kernel: audit: type=1400 audit(1734099418.823:798): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.864799 kernel: Failed to create system directory fscache Dec 13 14:16:58.864956 kernel: audit: type=1400 audit(1734099418.823:798): avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.873400 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.877938 kernel: Failed to create system directory fscache Dec 13 14:16:58.878052 kernel: Failed to create system directory fscache Dec 13 14:16:58.878103 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.881455 kernel: Failed to create system directory fscache Dec 13 14:16:58.881544 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.884945 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.886936 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.889104 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.890969 kernel: Failed to create system directory fscache Dec 13 14:16:58.823000 audit[3868]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab04900210 a1=4c344 a2=aaaad575e028 a3=aaab046de010 items=0 ppid=581 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:58.893488 kernel: FS-Cache: Loaded Dec 13 14:16:58.823000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.974187 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.974323 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.976466 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.978804 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.980963 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.982979 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.984986 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.986985 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.988967 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.990942 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.992972 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.994940 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.996896 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.998851 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.000830 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.002758 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.004711 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.006647 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.008750 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.010790 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.012730 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.014687 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.016633 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.018677 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.020594 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.022643 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.024685 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.026737 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.028770 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.030754 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.032883 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.035035 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.037118 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.039123 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.042984 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.043102 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.044992 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.046969 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.048924 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.050905 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.052846 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.054864 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.056819 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.058797 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.060722 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.062671 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.064563 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.066446 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.068429 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.070318 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.072230 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.074160 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.076111 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.078002 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.080019 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.081982 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.082120 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.085550 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.085695 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.089017 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.089139 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.092590 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.092731 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.096102 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.096226 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.099671 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.099786 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.103200 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.103442 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.106759 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.108567 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.108697 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.112044 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.112191 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.115564 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.115725 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.121766 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.121884 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.121927 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.124488 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.124673 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.128029 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.128161 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.131597 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.131673 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.134942 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.135080 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.138479 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.140634 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.140749 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.144390 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.144495 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.147683 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.147783 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.151017 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.151133 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.154394 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.154611 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.157774 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.157867 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.161563 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.161698 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.165197 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.165304 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.168590 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.168683 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.171992 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.172116 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.175375 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.175504 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.178756 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.178831 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.182265 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.182365 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.185806 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.185892 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.189187 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.189315 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.192674 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.192799 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.196100 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.196223 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.199543 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.199685 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.202827 kernel: Failed to create system directory sunrpc Dec 13 14:16:59.202958 kernel: Failed to create system directory sunrpc Dec 13 14:16:58.960000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.216646 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:16:59.216840 kernel: RPC: Registered udp transport module. Dec 13 14:16:59.216917 kernel: RPC: Registered tcp transport module. Dec 13 14:16:59.218054 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:16:58.960000 audit[3868]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0494c560 a1=14a504 a2=aaaad575e028 a3=aaab046de010 items=6 ppid=581 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:58.960000 audit: CWD cwd="/" Dec 13 14:16:58.960000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:58.960000 audit: PATH item=1 name=(null) inode=20687 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:58.960000 audit: PATH item=2 name=(null) inode=20687 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:58.960000 audit: PATH item=3 name=(null) inode=20688 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:58.960000 audit: PATH item=4 name=(null) inode=20687 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:58.960000 audit: PATH item=5 name=(null) inode=20689 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:58.960000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.269385 kernel: Failed to create system directory nfs Dec 13 14:16:59.269635 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.273142 kernel: Failed to create system directory nfs Dec 13 14:16:59.273286 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.276866 kernel: Failed to create system directory nfs Dec 13 14:16:59.276996 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.280142 kernel: Failed to create system directory nfs Dec 13 14:16:59.280322 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.283444 kernel: Failed to create system directory nfs Dec 13 14:16:59.283597 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.285106 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.288413 kernel: Failed to create system directory nfs Dec 13 14:16:59.288596 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.291710 kernel: Failed to create system directory nfs Dec 13 14:16:59.291864 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.295025 kernel: Failed to create system directory nfs Dec 13 14:16:59.295280 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.298240 kernel: Failed to create system directory nfs Dec 13 14:16:59.298414 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.301511 kernel: Failed to create system directory nfs Dec 13 14:16:59.301645 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.304816 kernel: Failed to create system directory nfs Dec 13 14:16:59.304926 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.307996 kernel: Failed to create system directory nfs Dec 13 14:16:59.308155 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.311231 kernel: Failed to create system directory nfs Dec 13 14:16:59.311392 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.314631 kernel: Failed to create system directory nfs Dec 13 14:16:59.314746 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.317684 kernel: Failed to create system directory nfs Dec 13 14:16:59.317780 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.320901 kernel: Failed to create system directory nfs Dec 13 14:16:59.321033 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.324226 kernel: Failed to create system directory nfs Dec 13 14:16:59.324437 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.327653 kernel: Failed to create system directory nfs Dec 13 14:16:59.327789 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.330947 kernel: Failed to create system directory nfs Dec 13 14:16:59.331068 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.332737 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.335950 kernel: Failed to create system directory nfs Dec 13 14:16:59.336076 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.339326 kernel: Failed to create system directory nfs Dec 13 14:16:59.339479 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.342653 kernel: Failed to create system directory nfs Dec 13 14:16:59.342796 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.345901 kernel: Failed to create system directory nfs Dec 13 14:16:59.346040 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.349183 kernel: Failed to create system directory nfs Dec 13 14:16:59.349274 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.352549 kernel: Failed to create system directory nfs Dec 13 14:16:59.352688 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.355755 kernel: Failed to create system directory nfs Dec 13 14:16:59.355850 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.359100 kernel: Failed to create system directory nfs Dec 13 14:16:59.359196 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.362291 kernel: Failed to create system directory nfs Dec 13 14:16:59.362465 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.365589 kernel: Failed to create system directory nfs Dec 13 14:16:59.365686 kernel: Failed to create system directory nfs Dec 13 14:16:59.260000 audit[3868]: AVC avc: denied { confidentiality } for pid=3868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.399510 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:16:59.260000 audit[3868]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab04af56f0 a1=116204 a2=aaaad575e028 a3=aaab046de010 items=0 ppid=581 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.260000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.455308 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.455420 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.457217 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.459110 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.459371 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.462978 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.464943 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.466894 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.468828 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.470771 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.472692 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.474571 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.476418 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.478214 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.479991 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.481825 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.483628 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.485517 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.487349 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.489159 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.492723 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.492808 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.494630 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.496452 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.498246 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.500049 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.501888 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.503699 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.505483 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.507276 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.509095 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.510953 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.512776 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.514599 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.516404 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.518201 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.520089 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.521887 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.523705 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.525507 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.527377 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.529142 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.530965 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.532756 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.534571 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.536515 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.538395 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.540193 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.542004 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.543803 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.545622 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.547536 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.549369 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.551167 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.554756 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.554832 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.556646 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.558470 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.560304 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.562133 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.563915 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.565728 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.567562 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.569396 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.571201 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.573021 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.574827 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.576672 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.578471 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.580318 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.582116 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.582364 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.585759 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.587640 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.589425 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.591283 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.593142 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.593362 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.596762 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.598620 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.600473 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.602297 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.604149 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.607715 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.607810 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.609585 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.611437 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.613228 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.615053 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.616937 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.618748 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.620590 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.622382 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.624185 kernel: Failed to create system directory nfs4 Dec 13 14:16:59.441000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.679257 kubelet[2217]: E1213 14:16:59.679092 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:59.831086 kernel: NFS: Registering the id_resolver key type Dec 13 14:16:59.831221 kernel: Key type id_resolver registered Dec 13 14:16:59.832673 kernel: Key type id_legacy registered Dec 13 14:16:59.441000 audit[3873]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb8b4a010 a1=19c49c a2=aaaaac77e028 a3=aaaade8ce010 items=0 ppid=581 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.441000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.853766 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.853883 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.853926 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.857105 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.857212 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.860474 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.860575 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.863854 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.864006 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.867221 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.867359 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.870636 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.870748 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.875722 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.875842 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.875887 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.879067 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.879187 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.882471 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.882616 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.885894 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.886042 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.889366 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.889478 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.892695 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.892794 kernel: Failed to create system directory rpcgss Dec 13 14:16:59.846000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:59.846000 audit[3874]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffadc72010 a1=5ee04 a2=aaaabb74e028 a3=aaaac240e010 items=0 ppid=581 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.846000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:16:59.946522 nfsidmap[3881]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:16:59.953028 nfsidmap[3882]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:16:59.968000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:16:59.968000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:16:59.968000 audit[2025]: AVC avc: denied { watch_reads } for pid=2025 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:16:59.968000 audit[2025]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeced3620 a2=10 a3=0 items=0 ppid=1 pid=2025 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.968000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:16:59.970000 audit[2025]: AVC avc: denied { watch_reads } for pid=2025 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:16:59.970000 audit[2025]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeced3620 a2=10 a3=0 items=0 ppid=1 pid=2025 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.970000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:17:00.126307 env[1822]: time="2024-12-13T14:17:00.125471782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9d2cfd07-b974-490f-9cf9-a417830d84f2,Namespace:default,Attempt:0,}" Dec 13 14:17:00.336990 (udev-worker)[3879]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:00.345156 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:00.345228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:17:00.338078 systemd-networkd[1536]: cali5ec59c6bf6e: Link UP Dec 13 14:17:00.344221 systemd-networkd[1536]: cali5ec59c6bf6e: Gained carrier Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.219 [INFO][3883] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.29.32-k8s-test--pod--1-eth0 default 9d2cfd07-b974-490f-9cf9-a417830d84f2 1263 0 2024-12-13 14:16:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.29.32 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.219 [INFO][3883] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.265 [INFO][3894] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" HandleID="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Workload="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.284 [INFO][3894] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" HandleID="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Workload="172.31.29.32-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000334dd0), Attrs:map[string]string{"namespace":"default", "node":"172.31.29.32", "pod":"test-pod-1", "timestamp":"2024-12-13 14:17:00.265231796 +0000 UTC"}, Hostname:"172.31.29.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.284 [INFO][3894] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.284 [INFO][3894] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.284 [INFO][3894] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.29.32' Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.287 [INFO][3894] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.293 [INFO][3894] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.300 [INFO][3894] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.303 [INFO][3894] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.307 [INFO][3894] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.307 [INFO][3894] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.309 [INFO][3894] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.316 [INFO][3894] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.328 [INFO][3894] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.196/26] block=192.168.51.192/26 handle="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.328 [INFO][3894] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.196/26] handle="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" host="172.31.29.32" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.328 [INFO][3894] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.328 [INFO][3894] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.196/26] IPv6=[] ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" HandleID="k8s-pod-network.a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Workload="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.371541 env[1822]: 2024-12-13 14:17:00.332 [INFO][3883] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9d2cfd07-b974-490f-9cf9-a417830d84f2", ResourceVersion:"1263", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:00.373121 env[1822]: 2024-12-13 14:17:00.332 [INFO][3883] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.196/32] ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.373121 env[1822]: 2024-12-13 14:17:00.332 [INFO][3883] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.373121 env[1822]: 2024-12-13 14:17:00.347 [INFO][3883] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.373121 env[1822]: 2024-12-13 14:17:00.347 [INFO][3883] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.29.32-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9d2cfd07-b974-490f-9cf9-a417830d84f2", ResourceVersion:"1263", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.29.32", ContainerID:"a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"92:44:87:ed:23:52", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:00.373121 env[1822]: 2024-12-13 14:17:00.367 [INFO][3883] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.29.32-k8s-test--pod--1-eth0" Dec 13 14:17:00.391000 audit[3918]: NETFILTER_CFG table=filter:90 family=2 entries=38 op=nft_register_chain pid=3918 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:00.391000 audit[3918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffd4a4cad0 a2=0 a3=ffffa9ce0fa8 items=0 ppid=2909 pid=3918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.391000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:00.403465 env[1822]: time="2024-12-13T14:17:00.403312198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:00.403778 env[1822]: time="2024-12-13T14:17:00.403727907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:00.403958 env[1822]: time="2024-12-13T14:17:00.403905437Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:00.404564 env[1822]: time="2024-12-13T14:17:00.404485200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e pid=3923 runtime=io.containerd.runc.v2 Dec 13 14:17:00.437642 systemd[1]: Started cri-containerd-a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e.scope. Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.466000 audit: BPF prog-id=129 op=LOAD Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3923 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663066383662346334643635643362643464653238663836393737 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3923 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663066383662346334643635643362643464653238663836393737 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit: BPF prog-id=130 op=LOAD Dec 13 14:17:00.467000 audit[3933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3923 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663066383662346334643635643362643464653238663836393737 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit: BPF prog-id=131 op=LOAD Dec 13 14:17:00.467000 audit[3933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3923 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663066383662346334643635643362643464653238663836393737 Dec 13 14:17:00.467000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:17:00.467000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { perfmon } for pid=3933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit[3933]: AVC avc: denied { bpf } for pid=3933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.467000 audit: BPF prog-id=132 op=LOAD Dec 13 14:17:00.467000 audit[3933]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3923 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663066383662346334643635643362643464653238663836393737 Dec 13 14:17:00.510624 env[1822]: time="2024-12-13T14:17:00.510550841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9d2cfd07-b974-490f-9cf9-a417830d84f2,Namespace:default,Attempt:0,} returns sandbox id \"a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e\"" Dec 13 14:17:00.513955 env[1822]: time="2024-12-13T14:17:00.513886426Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:17:00.679571 kubelet[2217]: E1213 14:17:00.679384 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:00.851417 env[1822]: time="2024-12-13T14:17:00.851320077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:00.854868 env[1822]: time="2024-12-13T14:17:00.854795763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:00.858199 env[1822]: time="2024-12-13T14:17:00.858142928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:00.861781 env[1822]: time="2024-12-13T14:17:00.861723892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:00.863447 env[1822]: time="2024-12-13T14:17:00.863389489Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:17:00.867910 env[1822]: time="2024-12-13T14:17:00.867853915Z" level=info msg="CreateContainer within sandbox \"a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:17:00.892768 env[1822]: time="2024-12-13T14:17:00.892699956Z" level=info msg="CreateContainer within sandbox \"a2f0f86b4c4d65d3bd4de28f8697764777629c54b70d3d4af6bbcb6c26b27b9e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e8d550e4a177e175fccb86b43e15cff0b65b6da819b102fe4108f4ffd0d1d723\"" Dec 13 14:17:00.894302 env[1822]: time="2024-12-13T14:17:00.894250063Z" level=info msg="StartContainer for \"e8d550e4a177e175fccb86b43e15cff0b65b6da819b102fe4108f4ffd0d1d723\"" Dec 13 14:17:00.927390 systemd[1]: Started cri-containerd-e8d550e4a177e175fccb86b43e15cff0b65b6da819b102fe4108f4ffd0d1d723.scope. Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.956000 audit: BPF prog-id=133 op=LOAD Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3923 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643535306534613137376531373566636362383662343365313563 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3923 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643535306534613137376531373566636362383662343365313563 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit: BPF prog-id=134 op=LOAD Dec 13 14:17:00.957000 audit[3970]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3923 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643535306534613137376531373566636362383662343365313563 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.957000 audit: BPF prog-id=135 op=LOAD Dec 13 14:17:00.957000 audit[3970]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3923 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643535306534613137376531373566636362383662343365313563 Dec 13 14:17:00.958000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:17:00.958000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { perfmon } for pid=3970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit[3970]: AVC avc: denied { bpf } for pid=3970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:00.958000 audit: BPF prog-id=136 op=LOAD Dec 13 14:17:00.958000 audit[3970]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3923 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643535306534613137376531373566636362383662343365313563 Dec 13 14:17:01.004794 env[1822]: time="2024-12-13T14:17:01.004707822Z" level=info msg="StartContainer for \"e8d550e4a177e175fccb86b43e15cff0b65b6da819b102fe4108f4ffd0d1d723\" returns successfully" Dec 13 14:17:01.679684 kubelet[2217]: E1213 14:17:01.679584 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:01.750584 systemd-networkd[1536]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:17:02.680773 kubelet[2217]: E1213 14:17:02.680721 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:03.682040 kubelet[2217]: E1213 14:17:03.681974 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:04.682627 kubelet[2217]: E1213 14:17:04.682542 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:05.683504 kubelet[2217]: E1213 14:17:05.683434 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:06.684672 kubelet[2217]: E1213 14:17:06.684606 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:07.685028 kubelet[2217]: E1213 14:17:07.684984 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:08.215124 systemd[1]: run-containerd-runc-k8s.io-d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58-runc.l1cRfn.mount: Deactivated successfully. Dec 13 14:17:08.686418 kubelet[2217]: E1213 14:17:08.686239 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:09.687295 kubelet[2217]: E1213 14:17:09.687231 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:10.687665 kubelet[2217]: E1213 14:17:10.687598 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:11.688612 kubelet[2217]: E1213 14:17:11.688515 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:12.607231 kubelet[2217]: E1213 14:17:12.607163 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:12.688963 kubelet[2217]: E1213 14:17:12.688894 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:13.689923 kubelet[2217]: E1213 14:17:13.689861 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:14.690875 kubelet[2217]: E1213 14:17:14.690835 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:15.692253 kubelet[2217]: E1213 14:17:15.692211 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:16.693319 kubelet[2217]: E1213 14:17:16.693249 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:17.694280 kubelet[2217]: E1213 14:17:17.694215 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:18.694679 kubelet[2217]: E1213 14:17:18.694610 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:19.695511 kubelet[2217]: E1213 14:17:19.695446 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:20.695959 kubelet[2217]: E1213 14:17:20.695887 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:21.696528 kubelet[2217]: E1213 14:17:21.696465 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:22.697239 kubelet[2217]: E1213 14:17:22.697180 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:23.698436 kubelet[2217]: E1213 14:17:23.698372 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:24.698870 kubelet[2217]: E1213 14:17:24.698826 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:25.239022 kubelet[2217]: E1213 14:17:25.238949 2217 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:25.699896 kubelet[2217]: E1213 14:17:25.699832 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:26.700407 kubelet[2217]: E1213 14:17:26.700321 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:27.701649 kubelet[2217]: E1213 14:17:27.701548 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:28.702244 kubelet[2217]: E1213 14:17:28.702172 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:29.702756 kubelet[2217]: E1213 14:17:29.702696 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:30.703926 kubelet[2217]: E1213 14:17:30.703878 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:31.705418 kubelet[2217]: E1213 14:17:31.705376 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:32.606849 kubelet[2217]: E1213 14:17:32.606809 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:32.706718 kubelet[2217]: E1213 14:17:32.706674 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:33.707911 kubelet[2217]: E1213 14:17:33.707860 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:34.709362 kubelet[2217]: E1213 14:17:34.709290 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:35.240306 kubelet[2217]: E1213 14:17:35.240244 2217 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:35.709859 kubelet[2217]: E1213 14:17:35.709806 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:36.711302 kubelet[2217]: E1213 14:17:36.711239 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:37.712796 kubelet[2217]: E1213 14:17:37.712743 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:38.217928 systemd[1]: run-containerd-runc-k8s.io-d113e5ffd7b78f204ceeced85351ac649aa995516d93d06a1d9ff3b769ebdd58-runc.jVLGyy.mount: Deactivated successfully. Dec 13 14:17:38.714535 kubelet[2217]: E1213 14:17:38.714483 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:39.715300 kubelet[2217]: E1213 14:17:39.715250 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:40.716981 kubelet[2217]: E1213 14:17:40.716917 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:41.717563 kubelet[2217]: E1213 14:17:41.717514 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:42.719131 kubelet[2217]: E1213 14:17:42.719086 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:43.720662 kubelet[2217]: E1213 14:17:43.720601 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:44.722552 kubelet[2217]: E1213 14:17:44.722488 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:45.240864 kubelet[2217]: E1213 14:17:45.240804 2217 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:45.723529 kubelet[2217]: E1213 14:17:45.723490 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:46.725359 kubelet[2217]: E1213 14:17:46.725285 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:47.726463 kubelet[2217]: E1213 14:17:47.726399 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:48.726700 kubelet[2217]: E1213 14:17:48.726628 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:49.727493 kubelet[2217]: E1213 14:17:49.727423 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:50.727615 kubelet[2217]: E1213 14:17:50.727541 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:51.728396 kubelet[2217]: E1213 14:17:51.728310 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:52.607245 kubelet[2217]: E1213 14:17:52.607177 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:52.728716 kubelet[2217]: E1213 14:17:52.728675 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:53.729760 kubelet[2217]: E1213 14:17:53.729714 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:54.730744 kubelet[2217]: E1213 14:17:54.730695 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:55.241459 kubelet[2217]: E1213 14:17:55.241403 2217 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:55.274430 kubelet[2217]: E1213 14:17:55.273101 2217 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": unexpected EOF" Dec 13 14:17:55.274430 kubelet[2217]: I1213 14:17:55.273193 2217 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Dec 13 14:17:55.275013 kubelet[2217]: E1213 14:17:55.274942 2217 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="200ms" Dec 13 14:17:55.476013 kubelet[2217]: E1213 14:17:55.475954 2217 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="400ms" Dec 13 14:17:55.732376 kubelet[2217]: E1213 14:17:55.732299 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:55.877801 kubelet[2217]: E1213 14:17:55.877744 2217 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="800ms" Dec 13 14:17:55.989783 kubelet[2217]: E1213 14:17:55.989257 2217 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.29.32\": Get \"https://172.31.18.231:6443/api/v1/nodes/172.31.29.32?resourceVersion=0&timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" Dec 13 14:17:55.990119 kubelet[2217]: E1213 14:17:55.990089 2217 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.29.32\": Get \"https://172.31.18.231:6443/api/v1/nodes/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" Dec 13 14:17:55.990701 kubelet[2217]: E1213 14:17:55.990655 2217 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.29.32\": Get \"https://172.31.18.231:6443/api/v1/nodes/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" Dec 13 14:17:55.991203 kubelet[2217]: E1213 14:17:55.991159 2217 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.29.32\": Get \"https://172.31.18.231:6443/api/v1/nodes/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" Dec 13 14:17:55.991657 kubelet[2217]: E1213 14:17:55.991623 2217 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.29.32\": Get \"https://172.31.18.231:6443/api/v1/nodes/172.31.29.32?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" Dec 13 14:17:55.991768 kubelet[2217]: E1213 14:17:55.991660 2217 kubelet_node_status.go:531] "Unable to update node status" err="update node status exceeds retry count" Dec 13 14:17:56.733458 kubelet[2217]: E1213 14:17:56.733400 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:57.734595 kubelet[2217]: E1213 14:17:57.734536 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:58.735002 kubelet[2217]: E1213 14:17:58.734953 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:59.735978 kubelet[2217]: E1213 14:17:59.735905 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:00.737054 kubelet[2217]: E1213 14:18:00.737009 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"