Dec 13 14:15:12.983999 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Dec 13 14:15:12.984044 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:15:12.984068 kernel: efi: EFI v2.70 by EDK II Dec 13 14:15:12.984083 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Dec 13 14:15:12.984097 kernel: ACPI: Early table checksum verification disabled Dec 13 14:15:12.984111 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Dec 13 14:15:12.984127 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Dec 13 14:15:12.984141 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:15:12.984155 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Dec 13 14:15:12.984169 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:15:12.984187 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Dec 13 14:15:12.984201 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Dec 13 14:15:12.984215 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Dec 13 14:15:12.984229 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:15:12.984245 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Dec 13 14:15:12.984290 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Dec 13 14:15:12.984309 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Dec 13 14:15:12.984325 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Dec 13 14:15:12.984339 kernel: printk: bootconsole [uart0] enabled Dec 13 14:15:12.984354 kernel: NUMA: Failed to initialise from firmware Dec 13 14:15:12.984369 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:15:12.984384 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Dec 13 14:15:12.984398 kernel: Zone ranges: Dec 13 14:15:12.984413 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Dec 13 14:15:12.984428 kernel: DMA32 empty Dec 13 14:15:12.984442 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Dec 13 14:15:12.984462 kernel: Movable zone start for each node Dec 13 14:15:12.984477 kernel: Early memory node ranges Dec 13 14:15:12.984491 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Dec 13 14:15:12.984506 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Dec 13 14:15:12.984520 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Dec 13 14:15:12.984535 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Dec 13 14:15:12.984549 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Dec 13 14:15:12.986340 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Dec 13 14:15:12.986357 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Dec 13 14:15:12.986372 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Dec 13 14:15:12.986387 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:15:12.986401 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Dec 13 14:15:12.986424 kernel: psci: probing for conduit method from ACPI. Dec 13 14:15:12.986439 kernel: psci: PSCIv1.0 detected in firmware. Dec 13 14:15:12.986460 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:15:12.986477 kernel: psci: Trusted OS migration not required Dec 13 14:15:12.986492 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:15:12.986511 kernel: ACPI: SRAT not present Dec 13 14:15:12.986528 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:15:12.986543 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:15:12.986559 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:15:12.986574 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:15:12.986589 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:15:12.986604 kernel: CPU features: detected: Spectre-v2 Dec 13 14:15:12.986619 kernel: CPU features: detected: Spectre-v3a Dec 13 14:15:12.986634 kernel: CPU features: detected: Spectre-BHB Dec 13 14:15:12.986649 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:15:12.986664 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:15:12.986683 kernel: CPU features: detected: ARM erratum 1742098 Dec 13 14:15:12.986699 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Dec 13 14:15:12.986714 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Dec 13 14:15:12.986729 kernel: Policy zone: Normal Dec 13 14:15:12.986747 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:15:12.986763 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:15:12.986800 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:15:12.986817 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:15:12.986833 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:15:12.986848 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Dec 13 14:15:12.986870 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Dec 13 14:15:12.986887 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:15:12.986902 kernel: trace event string verifier disabled Dec 13 14:15:12.986917 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:15:12.986933 kernel: rcu: RCU event tracing is enabled. Dec 13 14:15:12.986949 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:15:12.986965 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:15:12.986981 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:15:12.986996 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:15:12.987012 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:15:12.987027 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:15:12.987042 kernel: GICv3: 96 SPIs implemented Dec 13 14:15:12.987061 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:15:12.987076 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:15:12.987092 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:15:12.987107 kernel: GICv3: 16 PPIs implemented Dec 13 14:15:12.987124 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Dec 13 14:15:12.987139 kernel: ACPI: SRAT not present Dec 13 14:15:12.987154 kernel: ITS [mem 0x10080000-0x1009ffff] Dec 13 14:15:12.987169 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:15:12.987185 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:15:12.987201 kernel: GICv3: using LPI property table @0x00000004000b0000 Dec 13 14:15:12.987217 kernel: ITS: Using hypervisor restricted LPI range [128] Dec 13 14:15:12.987237 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Dec 13 14:15:12.987253 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Dec 13 14:15:12.987302 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Dec 13 14:15:12.987321 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Dec 13 14:15:12.987336 kernel: Console: colour dummy device 80x25 Dec 13 14:15:12.987353 kernel: printk: console [tty1] enabled Dec 13 14:15:12.987369 kernel: ACPI: Core revision 20210730 Dec 13 14:15:12.987385 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Dec 13 14:15:12.987401 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:15:12.987416 kernel: LSM: Security Framework initializing Dec 13 14:15:12.987438 kernel: SELinux: Initializing. Dec 13 14:15:12.987454 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:15:12.987470 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:15:12.987486 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:15:12.987501 kernel: Platform MSI: ITS@0x10080000 domain created Dec 13 14:15:12.987517 kernel: PCI/MSI: ITS@0x10080000 domain created Dec 13 14:15:12.987532 kernel: Remapping and enabling EFI services. Dec 13 14:15:12.987548 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:15:12.987563 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:15:12.987579 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Dec 13 14:15:12.987599 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Dec 13 14:15:12.987615 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Dec 13 14:15:12.987630 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:15:12.987646 kernel: SMP: Total of 2 processors activated. Dec 13 14:15:12.987661 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:15:12.987677 kernel: CPU features: detected: 32-bit EL1 Support Dec 13 14:15:12.987693 kernel: CPU features: detected: CRC32 instructions Dec 13 14:15:12.987708 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:15:12.987724 kernel: alternatives: patching kernel code Dec 13 14:15:12.987743 kernel: devtmpfs: initialized Dec 13 14:15:12.987759 kernel: KASLR disabled due to lack of seed Dec 13 14:15:12.987786 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:15:12.987806 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:15:12.987822 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:15:12.987838 kernel: SMBIOS 3.0.0 present. Dec 13 14:15:12.987854 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Dec 13 14:15:12.987870 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:15:12.987886 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:15:12.987903 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:15:12.987919 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:15:12.987940 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:15:12.987957 kernel: audit: type=2000 audit(0.258:1): state=initialized audit_enabled=0 res=1 Dec 13 14:15:12.987973 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:15:12.987989 kernel: cpuidle: using governor menu Dec 13 14:15:12.988005 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:15:12.988025 kernel: ASID allocator initialised with 32768 entries Dec 13 14:15:12.988042 kernel: ACPI: bus type PCI registered Dec 13 14:15:12.988058 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:15:12.988074 kernel: Serial: AMBA PL011 UART driver Dec 13 14:15:12.988090 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:15:12.988106 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:15:12.988122 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:15:12.988138 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:15:12.988154 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:15:12.988173 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:15:12.988190 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:15:12.988206 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:15:12.988222 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:15:12.988238 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:15:12.988254 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:15:12.988295 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:15:12.988319 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:15:12.988336 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:15:12.988358 kernel: ACPI: Interpreter enabled Dec 13 14:15:12.988375 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:15:12.988391 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:15:12.988407 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Dec 13 14:15:12.988718 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:15:12.988968 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:15:12.989180 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:15:12.989429 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Dec 13 14:15:12.989654 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Dec 13 14:15:12.989679 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Dec 13 14:15:12.989696 kernel: acpiphp: Slot [1] registered Dec 13 14:15:12.989713 kernel: acpiphp: Slot [2] registered Dec 13 14:15:12.989729 kernel: acpiphp: Slot [3] registered Dec 13 14:15:12.989745 kernel: acpiphp: Slot [4] registered Dec 13 14:15:12.989761 kernel: acpiphp: Slot [5] registered Dec 13 14:15:12.989778 kernel: acpiphp: Slot [6] registered Dec 13 14:15:12.989793 kernel: acpiphp: Slot [7] registered Dec 13 14:15:12.989816 kernel: acpiphp: Slot [8] registered Dec 13 14:15:12.989832 kernel: acpiphp: Slot [9] registered Dec 13 14:15:12.989848 kernel: acpiphp: Slot [10] registered Dec 13 14:15:12.989864 kernel: acpiphp: Slot [11] registered Dec 13 14:15:12.989880 kernel: acpiphp: Slot [12] registered Dec 13 14:15:12.989896 kernel: acpiphp: Slot [13] registered Dec 13 14:15:12.989913 kernel: acpiphp: Slot [14] registered Dec 13 14:15:12.989929 kernel: acpiphp: Slot [15] registered Dec 13 14:15:12.989945 kernel: acpiphp: Slot [16] registered Dec 13 14:15:12.989966 kernel: acpiphp: Slot [17] registered Dec 13 14:15:12.989982 kernel: acpiphp: Slot [18] registered Dec 13 14:15:12.989998 kernel: acpiphp: Slot [19] registered Dec 13 14:15:12.990015 kernel: acpiphp: Slot [20] registered Dec 13 14:15:12.990031 kernel: acpiphp: Slot [21] registered Dec 13 14:15:12.990047 kernel: acpiphp: Slot [22] registered Dec 13 14:15:12.990063 kernel: acpiphp: Slot [23] registered Dec 13 14:15:12.990078 kernel: acpiphp: Slot [24] registered Dec 13 14:15:12.990094 kernel: acpiphp: Slot [25] registered Dec 13 14:15:12.990110 kernel: acpiphp: Slot [26] registered Dec 13 14:15:12.990130 kernel: acpiphp: Slot [27] registered Dec 13 14:15:12.990147 kernel: acpiphp: Slot [28] registered Dec 13 14:15:12.990163 kernel: acpiphp: Slot [29] registered Dec 13 14:15:12.990179 kernel: acpiphp: Slot [30] registered Dec 13 14:15:12.990195 kernel: acpiphp: Slot [31] registered Dec 13 14:15:12.990211 kernel: PCI host bridge to bus 0000:00 Dec 13 14:15:12.990483 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Dec 13 14:15:12.990668 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:15:12.990879 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Dec 13 14:15:12.991070 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Dec 13 14:15:13.010392 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Dec 13 14:15:13.010701 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Dec 13 14:15:13.010944 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Dec 13 14:15:13.011165 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:15:13.011419 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Dec 13 14:15:13.011621 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:15:13.011834 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:15:13.012036 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Dec 13 14:15:13.012234 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Dec 13 14:15:13.012460 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Dec 13 14:15:13.012662 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:15:13.012866 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Dec 13 14:15:13.013064 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Dec 13 14:15:13.013286 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Dec 13 14:15:13.013494 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Dec 13 14:15:13.013697 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Dec 13 14:15:13.013884 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Dec 13 14:15:13.014067 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:15:13.014283 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Dec 13 14:15:13.014310 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:15:13.014328 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:15:13.014345 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:15:13.014362 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:15:13.014378 kernel: iommu: Default domain type: Translated Dec 13 14:15:13.014395 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:15:13.014411 kernel: vgaarb: loaded Dec 13 14:15:13.014427 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:15:13.014450 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:15:13.014466 kernel: PTP clock support registered Dec 13 14:15:13.014483 kernel: Registered efivars operations Dec 13 14:15:13.014500 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:15:13.014516 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:15:13.014532 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:15:13.014548 kernel: pnp: PnP ACPI init Dec 13 14:15:13.014799 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Dec 13 14:15:13.014837 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:15:13.014854 kernel: NET: Registered PF_INET protocol family Dec 13 14:15:13.014871 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:15:13.014888 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:15:13.014905 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:15:13.014922 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:15:13.014938 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:15:13.014955 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:15:13.014972 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:15:13.014993 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:15:13.015010 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:15:13.015026 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:15:13.015042 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Dec 13 14:15:13.015059 kernel: kvm [1]: HYP mode not available Dec 13 14:15:13.015075 kernel: Initialise system trusted keyrings Dec 13 14:15:13.015092 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:15:13.015108 kernel: Key type asymmetric registered Dec 13 14:15:13.015124 kernel: Asymmetric key parser 'x509' registered Dec 13 14:15:13.015145 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:15:13.015161 kernel: io scheduler mq-deadline registered Dec 13 14:15:13.015178 kernel: io scheduler kyber registered Dec 13 14:15:13.015194 kernel: io scheduler bfq registered Dec 13 14:15:13.026531 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Dec 13 14:15:13.026582 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:15:13.026601 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:15:13.026619 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Dec 13 14:15:13.026646 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:15:13.026664 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:15:13.026682 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Dec 13 14:15:13.026944 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Dec 13 14:15:13.026977 kernel: printk: console [ttyS0] disabled Dec 13 14:15:13.026995 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Dec 13 14:15:13.027013 kernel: printk: console [ttyS0] enabled Dec 13 14:15:13.027030 kernel: printk: bootconsole [uart0] disabled Dec 13 14:15:13.027047 kernel: thunder_xcv, ver 1.0 Dec 13 14:15:13.027063 kernel: thunder_bgx, ver 1.0 Dec 13 14:15:13.027095 kernel: nicpf, ver 1.0 Dec 13 14:15:13.027114 kernel: nicvf, ver 1.0 Dec 13 14:15:13.027567 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:15:13.027803 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:15:12 UTC (1734099312) Dec 13 14:15:13.027835 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:15:13.027854 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:15:13.027872 kernel: Segment Routing with IPv6 Dec 13 14:15:13.027889 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:15:13.027922 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:15:13.027941 kernel: Key type dns_resolver registered Dec 13 14:15:13.027958 kernel: registered taskstats version 1 Dec 13 14:15:13.027975 kernel: Loading compiled-in X.509 certificates Dec 13 14:15:13.027994 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:15:13.028010 kernel: Key type .fscrypt registered Dec 13 14:15:13.028029 kernel: Key type fscrypt-provisioning registered Dec 13 14:15:13.028047 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:15:13.028065 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:15:13.028095 kernel: ima: No architecture policies found Dec 13 14:15:13.028114 kernel: clk: Disabling unused clocks Dec 13 14:15:13.028131 kernel: Freeing unused kernel memory: 36416K Dec 13 14:15:13.028147 kernel: Run /init as init process Dec 13 14:15:13.028163 kernel: with arguments: Dec 13 14:15:13.028182 kernel: /init Dec 13 14:15:13.028199 kernel: with environment: Dec 13 14:15:13.028215 kernel: HOME=/ Dec 13 14:15:13.028232 kernel: TERM=linux Dec 13 14:15:13.028252 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:15:13.028307 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:13.028332 systemd[1]: Detected virtualization amazon. Dec 13 14:15:13.028351 systemd[1]: Detected architecture arm64. Dec 13 14:15:13.028368 systemd[1]: Running in initrd. Dec 13 14:15:13.028386 systemd[1]: No hostname configured, using default hostname. Dec 13 14:15:13.028404 systemd[1]: Hostname set to . Dec 13 14:15:13.028430 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:13.028448 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:15:13.028466 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:13.028483 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:13.028501 systemd[1]: Reached target paths.target. Dec 13 14:15:13.028518 systemd[1]: Reached target slices.target. Dec 13 14:15:13.028536 systemd[1]: Reached target swap.target. Dec 13 14:15:13.028554 systemd[1]: Reached target timers.target. Dec 13 14:15:13.028577 systemd[1]: Listening on iscsid.socket. Dec 13 14:15:13.028595 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:15:13.028613 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:15:13.028631 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:15:13.028649 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:15:13.028667 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:13.028685 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:13.028703 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:13.028726 systemd[1]: Reached target sockets.target. Dec 13 14:15:13.028745 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:13.028762 systemd[1]: Finished network-cleanup.service. Dec 13 14:15:13.028780 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:15:13.028798 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:13.028817 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:13.028835 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:13.028853 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:15:13.028871 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:13.028893 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:15:13.028911 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:15:13.028929 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:15:13.028949 kernel: audit: type=1130 audit(1734099312.976:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.028969 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:15:13.028988 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:15:13.029007 kernel: audit: type=1130 audit(1734099313.009:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.029031 systemd-journald[309]: Journal started Dec 13 14:15:13.029145 systemd-journald[309]: Runtime Journal (/run/log/journal/ec2797fe3359ac9541b07d1ed5411adf) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:12.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.963443 systemd-modules-load[310]: Inserted module 'overlay' Dec 13 14:15:13.056465 systemd[1]: Started systemd-journald.service. Dec 13 14:15:13.056549 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:15:13.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.064210 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:15:13.069437 kernel: audit: type=1130 audit(1734099313.055:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.069474 kernel: Bridge firewalling registered Dec 13 14:15:13.066052 systemd-modules-load[310]: Inserted module 'br_netfilter' Dec 13 14:15:13.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.079308 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:15:13.091313 kernel: audit: type=1130 audit(1734099313.066:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.102378 systemd-resolved[311]: Positive Trust Anchors: Dec 13 14:15:13.102406 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:13.102461 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:13.128300 kernel: SCSI subsystem initialized Dec 13 14:15:13.143877 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:15:13.143959 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:15:13.146945 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:15:13.148040 dracut-cmdline[327]: dracut-dracut-053 Dec 13 14:15:13.153479 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:15:13.165490 systemd-modules-load[310]: Inserted module 'dm_multipath' Dec 13 14:15:13.167064 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:13.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.186394 kernel: audit: type=1130 audit(1734099313.171:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.182244 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:13.208670 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:13.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.220040 kernel: audit: type=1130 audit(1734099313.209:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.321296 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:15:13.343304 kernel: iscsi: registered transport (tcp) Dec 13 14:15:13.370597 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:15:13.370695 kernel: QLogic iSCSI HBA Driver Dec 13 14:15:13.556844 systemd-resolved[311]: Defaulting to hostname 'linux'. Dec 13 14:15:13.559132 kernel: random: crng init done Dec 13 14:15:13.560401 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:13.572066 kernel: audit: type=1130 audit(1734099313.559:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.560884 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:13.589656 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:15:13.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.602733 kernel: audit: type=1130 audit(1734099313.590:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:13.600968 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:15:13.671335 kernel: raid6: neonx8 gen() 6360 MB/s Dec 13 14:15:13.687309 kernel: raid6: neonx8 xor() 4773 MB/s Dec 13 14:15:13.705318 kernel: raid6: neonx4 gen() 6392 MB/s Dec 13 14:15:13.723307 kernel: raid6: neonx4 xor() 4984 MB/s Dec 13 14:15:13.741294 kernel: raid6: neonx2 gen() 5664 MB/s Dec 13 14:15:13.759294 kernel: raid6: neonx2 xor() 4589 MB/s Dec 13 14:15:13.777310 kernel: raid6: neonx1 gen() 4417 MB/s Dec 13 14:15:13.795315 kernel: raid6: neonx1 xor() 3692 MB/s Dec 13 14:15:13.813311 kernel: raid6: int64x8 gen() 3395 MB/s Dec 13 14:15:13.831312 kernel: raid6: int64x8 xor() 2090 MB/s Dec 13 14:15:13.849308 kernel: raid6: int64x4 gen() 3770 MB/s Dec 13 14:15:13.867316 kernel: raid6: int64x4 xor() 2197 MB/s Dec 13 14:15:13.885377 kernel: raid6: int64x2 gen() 3521 MB/s Dec 13 14:15:13.903375 kernel: raid6: int64x2 xor() 1928 MB/s Dec 13 14:15:13.921312 kernel: raid6: int64x1 gen() 2721 MB/s Dec 13 14:15:13.940918 kernel: raid6: int64x1 xor() 1442 MB/s Dec 13 14:15:13.941057 kernel: raid6: using algorithm neonx4 gen() 6392 MB/s Dec 13 14:15:13.941098 kernel: raid6: .... xor() 4984 MB/s, rmw enabled Dec 13 14:15:13.942808 kernel: raid6: using neon recovery algorithm Dec 13 14:15:13.964597 kernel: xor: measuring software checksum speed Dec 13 14:15:13.964670 kernel: 8regs : 8994 MB/sec Dec 13 14:15:13.966363 kernel: 32regs : 11107 MB/sec Dec 13 14:15:13.968193 kernel: arm64_neon : 9206 MB/sec Dec 13 14:15:13.968305 kernel: xor: using function: 32regs (11107 MB/sec) Dec 13 14:15:14.068314 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:15:14.087961 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:15:14.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.097000 audit: BPF prog-id=7 op=LOAD Dec 13 14:15:14.097000 audit: BPF prog-id=8 op=LOAD Dec 13 14:15:14.099307 kernel: audit: type=1130 audit(1734099314.088:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.099748 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:14.129808 systemd-udevd[509]: Using default interface naming scheme 'v252'. Dec 13 14:15:14.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.141906 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:14.149022 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:15:14.185184 dracut-pre-trigger[519]: rd.md=0: removing MD RAID activation Dec 13 14:15:14.255779 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:15:14.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.260664 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:14.370680 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:14.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.519321 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:15:14.530629 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Dec 13 14:15:14.553526 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:15:14.553790 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:15:14.554002 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Dec 13 14:15:14.554028 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:15:14.554321 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:de:e1:f8:01:f5 Dec 13 14:15:14.557312 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:15:14.563671 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:15:14.563740 kernel: GPT:9289727 != 16777215 Dec 13 14:15:14.563764 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:15:14.565689 kernel: GPT:9289727 != 16777215 Dec 13 14:15:14.566863 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:15:14.569948 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:14.574161 (udev-worker)[566]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:14.669342 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (563) Dec 13 14:15:14.683875 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:15:14.740461 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:15:14.804710 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:15:14.812038 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:15:14.825738 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:15:14.830303 systemd[1]: Starting disk-uuid.service... Dec 13 14:15:14.847335 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:14.848433 disk-uuid[672]: Primary Header is updated. Dec 13 14:15:14.848433 disk-uuid[672]: Secondary Entries is updated. Dec 13 14:15:14.848433 disk-uuid[672]: Secondary Header is updated. Dec 13 14:15:14.862311 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:15.875306 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:15.875429 disk-uuid[673]: The operation has completed successfully. Dec 13 14:15:16.089708 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:15:16.092093 systemd[1]: Finished disk-uuid.service. Dec 13 14:15:16.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.097933 systemd[1]: Starting verity-setup.service... Dec 13 14:15:16.141610 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:15:16.223305 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:15:16.229838 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:15:16.235617 systemd[1]: Finished verity-setup.service. Dec 13 14:15:16.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.320320 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:15:16.321078 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:15:16.322001 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:15:16.339084 systemd[1]: Starting ignition-setup.service... Dec 13 14:15:16.343864 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:15:16.370676 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:16.370748 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:16.372823 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:16.381299 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:16.399607 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:15:16.422785 systemd[1]: Finished ignition-setup.service. Dec 13 14:15:16.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.427133 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:15:16.500184 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:15:16.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.503000 audit: BPF prog-id=9 op=LOAD Dec 13 14:15:16.505675 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:16.553669 systemd-networkd[1185]: lo: Link UP Dec 13 14:15:16.553692 systemd-networkd[1185]: lo: Gained carrier Dec 13 14:15:16.556176 systemd-networkd[1185]: Enumeration completed Dec 13 14:15:16.557387 systemd-networkd[1185]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:16.557664 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:16.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.567126 systemd[1]: Reached target network.target. Dec 13 14:15:16.572415 systemd[1]: Starting iscsiuio.service... Dec 13 14:15:16.577565 systemd-networkd[1185]: eth0: Link UP Dec 13 14:15:16.579164 systemd-networkd[1185]: eth0: Gained carrier Dec 13 14:15:16.587458 systemd[1]: Started iscsiuio.service. Dec 13 14:15:16.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.593043 systemd[1]: Starting iscsid.service... Dec 13 14:15:16.603422 iscsid[1190]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:16.608745 iscsid[1190]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:15:16.608745 iscsid[1190]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:15:16.608745 iscsid[1190]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:15:16.608745 iscsid[1190]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:16.608745 iscsid[1190]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:15:16.608805 systemd[1]: Started iscsid.service. Dec 13 14:15:16.626702 systemd-networkd[1185]: eth0: DHCPv4 address 172.31.19.77/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:16.653299 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:15:16.653380 kernel: audit: type=1130 audit(1734099316.630:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.653940 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:15:16.673362 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:15:16.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.676462 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:15:16.685233 kernel: audit: type=1130 audit(1734099316.675:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.686182 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:16.689410 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:16.693649 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:15:16.714180 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:15:16.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.725301 kernel: audit: type=1130 audit(1734099316.716:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.430544 ignition[1126]: Ignition 2.14.0 Dec 13 14:15:17.430571 ignition[1126]: Stage: fetch-offline Dec 13 14:15:17.430937 ignition[1126]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:17.431024 ignition[1126]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:17.454544 ignition[1126]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:17.457372 ignition[1126]: Ignition finished successfully Dec 13 14:15:17.460954 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:15:17.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.472509 systemd[1]: Starting ignition-fetch.service... Dec 13 14:15:17.477364 kernel: audit: type=1130 audit(1734099317.461:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.490360 ignition[1209]: Ignition 2.14.0 Dec 13 14:15:17.492146 ignition[1209]: Stage: fetch Dec 13 14:15:17.493715 ignition[1209]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:17.496059 ignition[1209]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:17.508691 ignition[1209]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:17.511242 ignition[1209]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:17.520552 ignition[1209]: INFO : PUT result: OK Dec 13 14:15:17.535902 ignition[1209]: DEBUG : parsed url from cmdline: "" Dec 13 14:15:17.537909 ignition[1209]: INFO : no config URL provided Dec 13 14:15:17.537909 ignition[1209]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:15:17.537909 ignition[1209]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:15:17.537909 ignition[1209]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:17.545827 ignition[1209]: INFO : PUT result: OK Dec 13 14:15:17.545827 ignition[1209]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:15:17.549849 ignition[1209]: INFO : GET result: OK Dec 13 14:15:17.551347 ignition[1209]: DEBUG : parsing config with SHA512: 36851e7f2a0c7caae4353c7444ce510cb9305f740583d0f48fa7e5a09a3f89b84b58dfa8f814db75d397956bf56755dae0aa8c0297849f75e72e30e123866d66 Dec 13 14:15:17.560647 unknown[1209]: fetched base config from "system" Dec 13 14:15:17.560677 unknown[1209]: fetched base config from "system" Dec 13 14:15:17.560692 unknown[1209]: fetched user config from "aws" Dec 13 14:15:17.565444 ignition[1209]: fetch: fetch complete Dec 13 14:15:17.565472 ignition[1209]: fetch: fetch passed Dec 13 14:15:17.566641 ignition[1209]: Ignition finished successfully Dec 13 14:15:17.573729 systemd[1]: Finished ignition-fetch.service. Dec 13 14:15:17.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.578227 systemd[1]: Starting ignition-kargs.service... Dec 13 14:15:17.587429 kernel: audit: type=1130 audit(1734099317.575:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.604838 ignition[1215]: Ignition 2.14.0 Dec 13 14:15:17.604864 ignition[1215]: Stage: kargs Dec 13 14:15:17.605164 ignition[1215]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:17.605223 ignition[1215]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:17.620376 ignition[1215]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:17.622852 ignition[1215]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:17.625919 ignition[1215]: INFO : PUT result: OK Dec 13 14:15:17.631773 ignition[1215]: kargs: kargs passed Dec 13 14:15:17.632098 ignition[1215]: Ignition finished successfully Dec 13 14:15:17.636621 systemd[1]: Finished ignition-kargs.service. Dec 13 14:15:17.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.647097 systemd[1]: Starting ignition-disks.service... Dec 13 14:15:17.650173 kernel: audit: type=1130 audit(1734099317.637:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.662074 ignition[1221]: Ignition 2.14.0 Dec 13 14:15:17.662103 ignition[1221]: Stage: disks Dec 13 14:15:17.662429 ignition[1221]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:17.662483 ignition[1221]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:17.676770 ignition[1221]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:17.679325 ignition[1221]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:17.682023 ignition[1221]: INFO : PUT result: OK Dec 13 14:15:17.686896 ignition[1221]: disks: disks passed Dec 13 14:15:17.687014 ignition[1221]: Ignition finished successfully Dec 13 14:15:17.690821 systemd[1]: Finished ignition-disks.service. Dec 13 14:15:17.701610 kernel: audit: type=1130 audit(1734099317.691:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.693144 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:15:17.701723 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:17.704741 systemd[1]: Reached target local-fs.target. Dec 13 14:15:17.707425 systemd[1]: Reached target sysinit.target. Dec 13 14:15:17.708880 systemd[1]: Reached target basic.target. Dec 13 14:15:17.712959 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:15:17.748868 systemd-fsck[1229]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:15:17.758061 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:15:17.761397 systemd[1]: Mounting sysroot.mount... Dec 13 14:15:17.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.774329 kernel: audit: type=1130 audit(1734099317.758:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:17.787293 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:15:17.788209 systemd[1]: Mounted sysroot.mount. Dec 13 14:15:17.791019 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:15:17.804703 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:15:17.808071 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:15:17.808192 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:15:17.810919 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:15:17.820421 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:15:17.850763 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:17.855831 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:15:17.876642 initrd-setup-root[1251]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:15:17.895978 initrd-setup-root[1259]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:15:17.903650 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1246) Dec 13 14:15:17.909342 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:17.909408 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:17.911793 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:17.912077 initrd-setup-root[1267]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:15:17.922315 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:17.925996 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:17.930228 initrd-setup-root[1293]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:15:18.179231 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:15:18.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:18.183634 systemd[1]: Starting ignition-mount.service... Dec 13 14:15:18.196410 kernel: audit: type=1130 audit(1734099318.180:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:18.194501 systemd[1]: Starting sysroot-boot.service... Dec 13 14:15:18.205682 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:18.207650 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:18.240504 systemd[1]: Finished sysroot-boot.service. Dec 13 14:15:18.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:18.250338 kernel: audit: type=1130 audit(1734099318.239:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:18.251208 ignition[1313]: INFO : Ignition 2.14.0 Dec 13 14:15:18.251208 ignition[1313]: INFO : Stage: mount Dec 13 14:15:18.254382 ignition[1313]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:18.254382 ignition[1313]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:18.270881 ignition[1313]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:18.273556 ignition[1313]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:18.276370 ignition[1313]: INFO : PUT result: OK Dec 13 14:15:18.282725 ignition[1313]: INFO : mount: mount passed Dec 13 14:15:18.284612 ignition[1313]: INFO : Ignition finished successfully Dec 13 14:15:18.287707 systemd[1]: Finished ignition-mount.service. Dec 13 14:15:18.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:18.291160 systemd[1]: Starting ignition-files.service... Dec 13 14:15:18.309415 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:18.329311 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1321) Dec 13 14:15:18.335293 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:18.335358 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:18.335382 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:18.344305 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:18.349193 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:18.369219 ignition[1340]: INFO : Ignition 2.14.0 Dec 13 14:15:18.369219 ignition[1340]: INFO : Stage: files Dec 13 14:15:18.372423 ignition[1340]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:18.372423 ignition[1340]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:18.388694 ignition[1340]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:18.391441 ignition[1340]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:18.393712 ignition[1340]: INFO : PUT result: OK Dec 13 14:15:18.398382 ignition[1340]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:15:18.402184 ignition[1340]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:15:18.402184 ignition[1340]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:15:18.433824 ignition[1340]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:15:18.436429 ignition[1340]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:15:18.439514 unknown[1340]: wrote ssh authorized keys file for user: core Dec 13 14:15:18.441612 ignition[1340]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:15:18.450171 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 14:15:18.457288 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 14:15:18.457288 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:18.457288 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:18.467188 ignition[1340]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem379340171" Dec 13 14:15:18.469985 ignition[1340]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem379340171": device or resource busy Dec 13 14:15:18.476624 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1345) Dec 13 14:15:18.476663 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem379340171", trying btrfs: device or resource busy Dec 13 14:15:18.476663 ignition[1340]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem379340171" Dec 13 14:15:18.485642 ignition[1340]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem379340171" Dec 13 14:15:18.495421 ignition[1340]: INFO : op(3): [started] unmounting "/mnt/oem379340171" Dec 13 14:15:18.498158 ignition[1340]: INFO : op(3): [finished] unmounting "/mnt/oem379340171" Dec 13 14:15:18.498158 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:18.498158 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:18.507489 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:18.507489 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:18.507489 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:18.507489 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:18.507489 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:18.507489 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:18.507489 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:18.537418 ignition[1340]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem202879287" Dec 13 14:15:18.537418 ignition[1340]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem202879287": device or resource busy Dec 13 14:15:18.537418 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem202879287", trying btrfs: device or resource busy Dec 13 14:15:18.537418 ignition[1340]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem202879287" Dec 13 14:15:18.537418 ignition[1340]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem202879287" Dec 13 14:15:18.562685 ignition[1340]: INFO : op(6): [started] unmounting "/mnt/oem202879287" Dec 13 14:15:18.562685 ignition[1340]: INFO : op(6): [finished] unmounting "/mnt/oem202879287" Dec 13 14:15:18.562685 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:18.562685 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:18.562685 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:18.562685 ignition[1340]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3293112346" Dec 13 14:15:18.562685 ignition[1340]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3293112346": device or resource busy Dec 13 14:15:18.562685 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3293112346", trying btrfs: device or resource busy Dec 13 14:15:18.562685 ignition[1340]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3293112346" Dec 13 14:15:18.562685 ignition[1340]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3293112346" Dec 13 14:15:18.562685 ignition[1340]: INFO : op(9): [started] unmounting "/mnt/oem3293112346" Dec 13 14:15:18.562685 ignition[1340]: INFO : op(9): [finished] unmounting "/mnt/oem3293112346" Dec 13 14:15:18.606028 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:18.606028 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:18.606028 ignition[1340]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:18.606028 ignition[1340]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1069920730" Dec 13 14:15:18.606028 ignition[1340]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1069920730": device or resource busy Dec 13 14:15:18.606028 ignition[1340]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1069920730", trying btrfs: device or resource busy Dec 13 14:15:18.606028 ignition[1340]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1069920730" Dec 13 14:15:18.606028 ignition[1340]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1069920730" Dec 13 14:15:18.606028 ignition[1340]: INFO : op(c): [started] unmounting "/mnt/oem1069920730" Dec 13 14:15:18.606028 ignition[1340]: INFO : op(c): [finished] unmounting "/mnt/oem1069920730" Dec 13 14:15:18.606028 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:18.606028 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:18.606028 ignition[1340]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 14:15:18.631787 systemd-networkd[1185]: eth0: Gained IPv6LL Dec 13 14:15:18.985357 ignition[1340]: INFO : GET result: OK Dec 13 14:15:19.602044 ignition[1340]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(d): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(d): op(e): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(d): op(e): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(d): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(f): [started] processing unit "nvidia.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(f): [finished] processing unit "nvidia.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(10): [started] processing unit "containerd.service" Dec 13 14:15:19.606390 ignition[1340]: INFO : files: op(10): op(11): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(10): op(11): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(10): [finished] processing unit "containerd.service" Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(13): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(13): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(14): [started] setting preset to enabled for "nvidia.service" Dec 13 14:15:19.636895 ignition[1340]: INFO : files: op(14): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:15:19.660344 ignition[1340]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:19.663512 ignition[1340]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:19.663512 ignition[1340]: INFO : files: files passed Dec 13 14:15:19.668165 ignition[1340]: INFO : Ignition finished successfully Dec 13 14:15:19.672203 systemd[1]: Finished ignition-files.service. Dec 13 14:15:19.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.685026 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:15:19.689572 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:15:19.691172 systemd[1]: Starting ignition-quench.service... Dec 13 14:15:19.704776 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:15:19.706646 systemd[1]: Finished ignition-quench.service. Dec 13 14:15:19.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.712718 initrd-setup-root-after-ignition[1365]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:15:19.716677 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:15:19.719398 systemd[1]: Reached target ignition-complete.target. Dec 13 14:15:19.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.727429 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:15:19.757235 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:15:19.759466 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:15:19.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.763089 systemd[1]: Reached target initrd-fs.target. Dec 13 14:15:19.766208 systemd[1]: Reached target initrd.target. Dec 13 14:15:19.769179 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:15:19.773307 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:15:19.797435 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:15:19.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.802164 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:15:19.824448 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:15:19.828099 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:15:19.831760 systemd[1]: Stopped target timers.target. Dec 13 14:15:19.834927 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:15:19.835779 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:15:19.840100 systemd[1]: Stopped target initrd.target. Dec 13 14:15:19.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.843190 systemd[1]: Stopped target basic.target. Dec 13 14:15:19.846050 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:15:19.849430 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:15:19.852788 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:15:19.856452 systemd[1]: Stopped target remote-fs.target. Dec 13 14:15:19.859779 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:15:19.863005 systemd[1]: Stopped target sysinit.target. Dec 13 14:15:19.865898 systemd[1]: Stopped target local-fs.target. Dec 13 14:15:19.868836 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:15:19.871984 systemd[1]: Stopped target swap.target. Dec 13 14:15:19.874937 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:15:19.877096 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:15:19.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.880600 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:15:19.883835 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:15:19.885786 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:15:19.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.889075 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:15:19.891360 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:15:19.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.895182 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:15:19.897219 systemd[1]: Stopped ignition-files.service. Dec 13 14:15:19.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.901970 systemd[1]: Stopping ignition-mount.service... Dec 13 14:15:19.911647 iscsid[1190]: iscsid shutting down. Dec 13 14:15:19.911306 systemd[1]: Stopping iscsid.service... Dec 13 14:15:19.916508 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:15:19.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.916820 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:15:19.924999 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:15:19.930539 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:15:19.930897 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:15:19.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.937218 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:15:19.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.944539 ignition[1378]: INFO : Ignition 2.14.0 Dec 13 14:15:19.944539 ignition[1378]: INFO : Stage: umount Dec 13 14:15:19.937489 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:15:19.949474 ignition[1378]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:19.949474 ignition[1378]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:19.969168 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:15:19.972818 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:15:19.974824 systemd[1]: Stopped iscsid.service. Dec 13 14:15:19.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.983889 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:15:19.986433 ignition[1378]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:19.988684 ignition[1378]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:19.991302 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:15:19.993139 ignition[1378]: INFO : PUT result: OK Dec 13 14:15:19.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:19.997629 systemd[1]: Stopping iscsiuio.service... Dec 13 14:15:20.003276 ignition[1378]: INFO : umount: umount passed Dec 13 14:15:20.003276 ignition[1378]: INFO : Ignition finished successfully Dec 13 14:15:20.006399 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:15:20.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.007733 systemd[1]: Stopped iscsiuio.service. Dec 13 14:15:20.011143 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:15:20.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.011369 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:15:20.014489 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:15:20.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.014691 systemd[1]: Stopped ignition-mount.service. Dec 13 14:15:20.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.020043 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:15:20.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.020150 systemd[1]: Stopped ignition-disks.service. Dec 13 14:15:20.022964 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:15:20.023066 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:15:20.025703 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:15:20.026372 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:15:20.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.028815 systemd[1]: Stopped target network.target. Dec 13 14:15:20.031690 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:15:20.031800 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:15:20.033505 systemd[1]: Stopped target paths.target. Dec 13 14:15:20.034902 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:15:20.037356 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:15:20.039823 systemd[1]: Stopped target slices.target. Dec 13 14:15:20.072000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:15:20.041160 systemd[1]: Stopped target sockets.target. Dec 13 14:15:20.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.043404 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:15:20.043484 systemd[1]: Closed iscsid.socket. Dec 13 14:15:20.045308 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:15:20.045388 systemd[1]: Closed iscsiuio.socket. Dec 13 14:15:20.047331 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:15:20.047424 systemd[1]: Stopped ignition-setup.service. Dec 13 14:15:20.050323 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:15:20.050406 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:15:20.052864 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:15:20.054708 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:15:20.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.065180 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:15:20.065449 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:15:20.065586 systemd-networkd[1185]: eth0: DHCPv6 lease lost Dec 13 14:15:20.108000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:15:20.086482 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:15:20.089730 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:15:20.108123 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:15:20.108207 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:15:20.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.120115 systemd[1]: Stopping network-cleanup.service... Dec 13 14:15:20.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.121584 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:15:20.121715 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:15:20.123593 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:15:20.123700 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:15:20.128913 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:15:20.129015 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:15:20.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.137945 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:15:20.149211 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:15:20.155722 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:15:20.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.156074 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:15:20.160184 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:15:20.160403 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:15:20.162119 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:15:20.162202 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:15:20.165197 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:15:20.167064 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:15:20.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.175602 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:15:20.175716 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:15:20.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.180427 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:15:20.180558 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:15:20.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.187034 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:15:20.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.190422 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:15:20.190549 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:15:20.193038 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:15:20.193444 systemd[1]: Stopped network-cleanup.service. Dec 13 14:15:20.216490 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:15:20.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:20.216678 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:15:20.218826 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:15:20.222533 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:15:20.268937 systemd[1]: Switching root. Dec 13 14:15:20.273000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:15:20.273000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:15:20.273000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:15:20.273000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:15:20.273000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:15:20.294129 systemd-journald[309]: Journal stopped Dec 13 14:15:27.204327 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Dec 13 14:15:27.204482 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:15:27.204528 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:15:27.204563 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:15:27.204596 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:15:27.204628 kernel: SELinux: policy capability open_perms=1 Dec 13 14:15:27.204665 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:15:27.204698 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:15:27.204734 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:15:27.204769 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:15:27.204800 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:15:27.204831 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:15:27.204861 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 14:15:27.204893 kernel: audit: type=1403 audit(1734099321.688:83): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:15:27.204935 systemd[1]: Successfully loaded SELinux policy in 121.174ms. Dec 13 14:15:27.204984 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 38.763ms. Dec 13 14:15:27.205022 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:27.205056 systemd[1]: Detected virtualization amazon. Dec 13 14:15:27.205088 systemd[1]: Detected architecture arm64. Dec 13 14:15:27.205120 systemd[1]: Detected first boot. Dec 13 14:15:27.205151 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:27.205183 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:15:27.205217 kernel: audit: type=1400 audit(1734099322.181:84): avc: denied { associate } for pid=1428 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:15:27.205248 kernel: audit: type=1300 audit(1734099322.181:84): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014767c a1=40000c8ae0 a2=40000cea00 a3=32 items=0 ppid=1411 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:27.205318 kernel: audit: type=1327 audit(1734099322.181:84): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:27.205352 kernel: audit: type=1400 audit(1734099322.191:85): avc: denied { associate } for pid=1428 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:15:27.205385 kernel: audit: type=1300 audit(1734099322.191:85): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000147755 a2=1ed a3=0 items=2 ppid=1411 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:27.205420 kernel: audit: type=1307 audit(1734099322.191:85): cwd="/" Dec 13 14:15:27.205450 kernel: audit: type=1302 audit(1734099322.191:85): item=0 name=(null) inode=2 dev=00:2a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:27.205492 kernel: audit: type=1302 audit(1734099322.191:85): item=1 name=(null) inode=3 dev=00:2a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:27.205524 kernel: audit: type=1327 audit(1734099322.191:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:27.205557 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:15:27.205591 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:27.205627 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:27.205661 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:27.205692 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:15:27.205727 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:15:27.205758 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:15:27.205790 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:15:27.205823 systemd[1]: Created slice system-getty.slice. Dec 13 14:15:27.205855 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:15:27.205886 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:15:27.205927 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:15:27.205963 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:15:27.205994 systemd[1]: Created slice user.slice. Dec 13 14:15:27.206024 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:27.206056 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:15:27.206086 systemd[1]: Set up automount boot.automount. Dec 13 14:15:27.206129 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:15:27.206163 systemd[1]: Reached target integritysetup.target. Dec 13 14:15:27.206194 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:27.206225 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:27.206255 systemd[1]: Reached target slices.target. Dec 13 14:15:27.206826 systemd[1]: Reached target swap.target. Dec 13 14:15:27.206862 systemd[1]: Reached target torcx.target. Dec 13 14:15:27.206894 systemd[1]: Reached target veritysetup.target. Dec 13 14:15:27.206925 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:15:27.206955 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:15:27.206988 kernel: audit: type=1400 audit(1734099326.764:86): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:27.207019 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:15:27.207049 kernel: audit: type=1335 audit(1734099326.765:87): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 14:15:27.207083 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:15:27.207114 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:15:27.207144 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:27.207180 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:27.207215 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:27.207247 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:15:27.207335 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:15:27.207372 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:15:27.207408 systemd[1]: Mounting media.mount... Dec 13 14:15:27.207442 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:15:27.207482 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:15:27.207517 systemd[1]: Mounting tmp.mount... Dec 13 14:15:27.207549 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:15:27.208967 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:27.209035 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:27.209067 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:15:27.209099 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:27.209131 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:27.209161 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:27.209198 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:15:27.209228 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:27.209280 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:15:27.209324 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 14:15:27.209356 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 14:15:27.209387 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:27.209417 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:27.209447 kernel: fuse: init (API version 7.34) Dec 13 14:15:27.209488 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:15:27.209527 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:15:27.209562 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:27.209595 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:15:27.209633 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:15:27.209668 systemd[1]: Mounted media.mount. Dec 13 14:15:27.209699 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:15:27.209735 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:15:27.209766 systemd[1]: Mounted tmp.mount. Dec 13 14:15:27.209804 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:27.209836 kernel: audit: type=1130 audit(1734099327.055:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.209867 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:15:27.209906 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:15:27.209936 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:27.209966 kernel: audit: type=1130 audit(1734099327.073:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.209998 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:27.210028 kernel: loop: module loaded Dec 13 14:15:27.210057 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:27.210092 kernel: audit: type=1131 audit(1734099327.073:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.210121 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:27.210151 kernel: audit: type=1130 audit(1734099327.088:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.210181 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:27.210212 kernel: audit: type=1131 audit(1734099327.088:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.210242 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:27.210303 kernel: audit: type=1130 audit(1734099327.119:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.210344 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:15:27.210375 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:15:27.210406 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:27.210436 kernel: audit: type=1131 audit(1734099327.119:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.210469 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:27.210500 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:27.210534 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:15:27.210566 kernel: audit: type=1130 audit(1734099327.140:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.210600 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:15:27.210634 systemd[1]: Reached target network-pre.target. Dec 13 14:15:27.210665 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:15:27.210716 systemd-journald[1529]: Journal started Dec 13 14:15:27.210830 systemd-journald[1529]: Runtime Journal (/run/log/journal/ec2797fe3359ac9541b07d1ed5411adf) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:26.765000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 14:15:27.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.200000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:15:27.200000 audit[1529]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffd5e4ddf0 a2=4000 a3=1 items=0 ppid=1 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:27.200000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:15:27.222168 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:15:27.247344 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:15:27.247652 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:15:27.247736 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:27.260400 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:15:27.267300 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:27.278675 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:27.288345 systemd[1]: Started systemd-journald.service. Dec 13 14:15:27.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.291220 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:15:27.293665 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:15:27.298410 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:15:27.303464 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:15:27.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.308803 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:15:27.321004 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:15:27.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.322989 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:15:27.344817 systemd-journald[1529]: Time spent on flushing to /var/log/journal/ec2797fe3359ac9541b07d1ed5411adf is 65.867ms for 1069 entries. Dec 13 14:15:27.344817 systemd-journald[1529]: System Journal (/var/log/journal/ec2797fe3359ac9541b07d1ed5411adf) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:15:27.444715 systemd-journald[1529]: Received client request to flush runtime journal. Dec 13 14:15:27.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.388543 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:27.447223 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:15:27.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.467954 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:27.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.472414 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:15:27.493771 udevadm[1578]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:15:27.535450 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:15:27.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.539859 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:15:27.628287 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:15:27.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.276031 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:15:28.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.280124 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:28.320149 systemd-udevd[1584]: Using default interface naming scheme 'v252'. Dec 13 14:15:28.359167 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:28.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.366614 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:28.394837 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:15:28.432491 (udev-worker)[1586]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:28.437659 systemd[1]: Found device dev-ttyS0.device. Dec 13 14:15:28.522299 systemd[1]: Started systemd-userdbd.service. Dec 13 14:15:28.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.710846 systemd-networkd[1596]: lo: Link UP Dec 13 14:15:28.711463 systemd-networkd[1596]: lo: Gained carrier Dec 13 14:15:28.712576 systemd-networkd[1596]: Enumeration completed Dec 13 14:15:28.712907 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:28.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.717102 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:15:28.719791 systemd-networkd[1596]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:28.725174 systemd-networkd[1596]: eth0: Link UP Dec 13 14:15:28.725372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:28.725958 systemd-networkd[1596]: eth0: Gained carrier Dec 13 14:15:28.737545 systemd-networkd[1596]: eth0: DHCPv4 address 172.31.19.77/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:28.751321 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1592) Dec 13 14:15:28.888255 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Dec 13 14:15:28.889532 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:15:28.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.904555 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:15:28.973804 lvm[1704]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:29.012044 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:15:29.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.014483 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:29.019052 systemd[1]: Starting lvm2-activation.service... Dec 13 14:15:29.029163 lvm[1706]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:29.065010 systemd[1]: Finished lvm2-activation.service. Dec 13 14:15:29.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.067212 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:29.069098 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:15:29.069588 systemd[1]: Reached target local-fs.target. Dec 13 14:15:29.071473 systemd[1]: Reached target machines.target. Dec 13 14:15:29.075989 systemd[1]: Starting ldconfig.service... Dec 13 14:15:29.079150 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:29.079546 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:29.082129 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:15:29.086351 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:15:29.091503 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:15:29.096477 systemd[1]: Starting systemd-sysext.service... Dec 13 14:15:29.110304 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1709 (bootctl) Dec 13 14:15:29.115096 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:15:29.147372 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:15:29.150991 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:15:29.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.168921 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:29.169564 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:15:29.198304 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 14:15:29.253378 systemd-fsck[1718]: fsck.fat 4.2 (2021-01-31) Dec 13 14:15:29.253378 systemd-fsck[1718]: /dev/nvme0n1p1: 236 files, 117175/258078 clusters Dec 13 14:15:29.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.258390 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:15:29.263304 systemd[1]: Mounting boot.mount... Dec 13 14:15:29.295885 systemd[1]: Mounted boot.mount. Dec 13 14:15:29.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.322384 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:15:29.370316 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:15:29.396322 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 14:15:29.411718 (sd-sysext)[1742]: Using extensions 'kubernetes'. Dec 13 14:15:29.412877 (sd-sysext)[1742]: Merged extensions into '/usr'. Dec 13 14:15:29.461100 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:15:29.464880 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:29.472230 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:29.478546 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:29.483519 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:29.485886 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:29.487828 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:29.506737 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:15:29.509720 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:29.510443 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:29.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.514347 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:29.514971 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:29.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.520606 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:29.521397 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:29.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.524878 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:29.525514 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:29.526897 systemd[1]: Finished systemd-sysext.service. Dec 13 14:15:29.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.535520 systemd[1]: Starting ensure-sysext.service... Dec 13 14:15:29.540407 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:15:29.566861 systemd[1]: Reloading. Dec 13 14:15:29.578462 systemd-tmpfiles[1756]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:15:29.589894 systemd-tmpfiles[1756]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:15:29.598916 systemd-tmpfiles[1756]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:15:29.701550 /usr/lib/systemd/system-generators/torcx-generator[1775]: time="2024-12-13T14:15:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:29.701618 /usr/lib/systemd/system-generators/torcx-generator[1775]: time="2024-12-13T14:15:29Z" level=info msg="torcx already run" Dec 13 14:15:29.980607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:29.980644 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:30.030589 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:30.215746 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:15:30.222616 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:15:30.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.228004 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:15:30.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.237123 systemd[1]: Starting audit-rules.service... Dec 13 14:15:30.243839 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:15:30.254541 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:15:30.260088 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:30.266252 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:15:30.278749 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:15:30.287628 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:15:30.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.295000 audit[1852]: SYSTEM_BOOT pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.312538 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.317737 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:30.323510 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:30.333768 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:30.335556 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.335861 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:30.336204 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:30.338697 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:15:30.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.350831 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:30.351329 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:30.355123 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:30.355917 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:30.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.360386 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.362698 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.362999 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:30.364592 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:30.364843 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:30.380364 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.383394 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:30.388761 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:30.408619 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:30.410812 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.411432 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:30.411827 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:30.414130 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:30.414561 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:30.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.419736 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:30.420137 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:30.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.423578 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.427996 systemd[1]: Finished ensure-sysext.service. Dec 13 14:15:30.448163 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:30.448587 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:30.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.457138 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:15:30.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.469307 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:30.469691 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:30.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.471709 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:30.493571 ldconfig[1708]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:15:30.510000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:15:30.510000 audit[1876]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcf561cc0 a2=420 a3=0 items=0 ppid=1840 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:30.510000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:15:30.512083 augenrules[1876]: No rules Dec 13 14:15:30.513804 systemd[1]: Finished ldconfig.service. Dec 13 14:15:30.516099 systemd[1]: Finished audit-rules.service. Dec 13 14:15:30.521593 systemd[1]: Starting systemd-update-done.service... Dec 13 14:15:30.553173 systemd[1]: Finished systemd-update-done.service. Dec 13 14:15:30.600509 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:15:30.602588 systemd[1]: Reached target time-set.target. Dec 13 14:15:30.613300 systemd-resolved[1844]: Positive Trust Anchors: Dec 13 14:15:30.613869 systemd-resolved[1844]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:30.614025 systemd-resolved[1844]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:30.678634 systemd-resolved[1844]: Defaulting to hostname 'linux'. Dec 13 14:15:30.681783 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:30.683565 systemd[1]: Reached target network.target. Dec 13 14:15:30.685113 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:30.686739 systemd[1]: Reached target sysinit.target. Dec 13 14:15:30.688527 systemd[1]: Started motdgen.path. Dec 13 14:15:30.690004 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:15:30.692547 systemd[1]: Started logrotate.timer. Dec 13 14:15:30.693557 systemd-timesyncd[1846]: Contacted time server 45.55.58.103:123 (0.flatcar.pool.ntp.org). Dec 13 14:15:30.693661 systemd-timesyncd[1846]: Initial clock synchronization to Fri 2024-12-13 14:15:30.898752 UTC. Dec 13 14:15:30.694342 systemd[1]: Started mdadm.timer. Dec 13 14:15:30.695703 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:15:30.697483 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:15:30.697543 systemd[1]: Reached target paths.target. Dec 13 14:15:30.698949 systemd[1]: Reached target timers.target. Dec 13 14:15:30.700892 systemd[1]: Listening on dbus.socket. Dec 13 14:15:30.704559 systemd[1]: Starting docker.socket... Dec 13 14:15:30.712773 systemd[1]: Listening on sshd.socket. Dec 13 14:15:30.714564 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:30.715725 systemd[1]: Listening on docker.socket. Dec 13 14:15:30.717343 systemd[1]: Reached target sockets.target. Dec 13 14:15:30.718931 systemd[1]: Reached target basic.target. Dec 13 14:15:30.720677 systemd[1]: System is tainted: cgroupsv1 Dec 13 14:15:30.720759 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.720808 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:30.723682 systemd[1]: Starting containerd.service... Dec 13 14:15:30.726467 systemd-networkd[1596]: eth0: Gained IPv6LL Dec 13 14:15:30.729415 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:15:30.734253 systemd[1]: Starting dbus.service... Dec 13 14:15:30.739432 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:15:30.746667 systemd[1]: Starting extend-filesystems.service... Dec 13 14:15:30.750895 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:15:30.754295 systemd[1]: Starting motdgen.service... Dec 13 14:15:30.761985 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:15:30.766349 systemd[1]: Starting sshd-keygen.service... Dec 13 14:15:30.774790 systemd[1]: Starting systemd-logind.service... Dec 13 14:15:30.778446 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:30.778613 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:15:30.781410 systemd[1]: Starting update-engine.service... Dec 13 14:15:30.785542 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:15:30.791139 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:15:30.794860 systemd[1]: Reached target network-online.target. Dec 13 14:15:30.825088 jq[1894]: false Dec 13 14:15:30.803026 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:15:30.808722 systemd[1]: Starting kubelet.service... Dec 13 14:15:30.812872 systemd[1]: Started nvidia.service. Dec 13 14:15:30.835993 jq[1901]: true Dec 13 14:15:30.816011 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:15:30.816642 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:15:30.852923 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:15:30.853559 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:15:30.893257 jq[1918]: true Dec 13 14:15:31.010254 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:15:31.010819 systemd[1]: Finished motdgen.service. Dec 13 14:15:31.103087 dbus-daemon[1893]: [system] SELinux support is enabled Dec 13 14:15:31.103446 systemd[1]: Started dbus.service. Dec 13 14:15:31.109180 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:15:31.109230 systemd[1]: Reached target system-config.target. Dec 13 14:15:31.111215 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:15:31.111262 systemd[1]: Reached target user-config.target. Dec 13 14:15:31.125628 extend-filesystems[1895]: Found loop1 Dec 13 14:15:31.127632 extend-filesystems[1895]: Found nvme0n1 Dec 13 14:15:31.133008 extend-filesystems[1895]: Found nvme0n1p1 Dec 13 14:15:31.134521 extend-filesystems[1895]: Found nvme0n1p2 Dec 13 14:15:31.134521 extend-filesystems[1895]: Found nvme0n1p3 Dec 13 14:15:31.134521 extend-filesystems[1895]: Found usr Dec 13 14:15:31.134521 extend-filesystems[1895]: Found nvme0n1p4 Dec 13 14:15:31.134521 extend-filesystems[1895]: Found nvme0n1p6 Dec 13 14:15:31.134521 extend-filesystems[1895]: Found nvme0n1p7 Dec 13 14:15:31.134521 extend-filesystems[1895]: Found nvme0n1p9 Dec 13 14:15:31.134521 extend-filesystems[1895]: Checking size of /dev/nvme0n1p9 Dec 13 14:15:31.150938 dbus-daemon[1893]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1596 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:31.165944 dbus-daemon[1893]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:15:31.172081 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:15:31.199518 update_engine[1900]: I1213 14:15:31.198702 1900 main.cc:92] Flatcar Update Engine starting Dec 13 14:15:31.208869 systemd[1]: Started update-engine.service. Dec 13 14:15:31.211418 update_engine[1900]: I1213 14:15:31.208927 1900 update_check_scheduler.cc:74] Next update check in 11m52s Dec 13 14:15:31.239255 systemd[1]: Started locksmithd.service. Dec 13 14:15:31.277125 extend-filesystems[1895]: Resized partition /dev/nvme0n1p9 Dec 13 14:15:31.292115 extend-filesystems[1974]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:15:31.300089 env[1927]: time="2024-12-13T14:15:31.298734164Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:15:31.304948 bash[1964]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:31.306431 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:15:31.315941 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:15:31.317314 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:15:31.330590 amazon-ssm-agent[1904]: 2024/12/13 14:15:31 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:15:31.348152 amazon-ssm-agent[1904]: Initializing new seelog logger Dec 13 14:15:31.349535 amazon-ssm-agent[1904]: New Seelog Logger Creation Complete Dec 13 14:15:31.349535 amazon-ssm-agent[1904]: 2024/12/13 14:15:31 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:31.349535 amazon-ssm-agent[1904]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:31.349535 amazon-ssm-agent[1904]: 2024/12/13 14:15:31 processing appconfig overrides Dec 13 14:15:31.392319 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:15:31.423639 env[1927]: time="2024-12-13T14:15:31.423493057Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:15:31.433637 env[1927]: time="2024-12-13T14:15:31.432481973Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:31.436381 extend-filesystems[1974]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:15:31.436381 extend-filesystems[1974]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:15:31.436381 extend-filesystems[1974]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:15:31.460932 extend-filesystems[1895]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:15:31.439576 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:15:31.440103 systemd[1]: Finished extend-filesystems.service. Dec 13 14:15:31.476103 env[1927]: time="2024-12-13T14:15:31.475851600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:31.476103 env[1927]: time="2024-12-13T14:15:31.475924138Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:31.477454 env[1927]: time="2024-12-13T14:15:31.477320534Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:31.479127 env[1927]: time="2024-12-13T14:15:31.479070740Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:31.479362 env[1927]: time="2024-12-13T14:15:31.479324626Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:15:31.479492 env[1927]: time="2024-12-13T14:15:31.479459742Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:31.480546 env[1927]: time="2024-12-13T14:15:31.480499890Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:31.482566 env[1927]: time="2024-12-13T14:15:31.482510309Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:31.485880 env[1927]: time="2024-12-13T14:15:31.485673282Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:31.487744 env[1927]: time="2024-12-13T14:15:31.487688022Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:15:31.488402 env[1927]: time="2024-12-13T14:15:31.488353349Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:15:31.488638 env[1927]: time="2024-12-13T14:15:31.488603209Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:15:31.498487 env[1927]: time="2024-12-13T14:15:31.498257710Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:15:31.498920 env[1927]: time="2024-12-13T14:15:31.498866366Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:15:31.499154 env[1927]: time="2024-12-13T14:15:31.499120781Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:15:31.499368 env[1927]: time="2024-12-13T14:15:31.499335746Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.499690 env[1927]: time="2024-12-13T14:15:31.499657405Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.499858 env[1927]: time="2024-12-13T14:15:31.499826371Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.499991 env[1927]: time="2024-12-13T14:15:31.499959924Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.501053 env[1927]: time="2024-12-13T14:15:31.500984686Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.501339 env[1927]: time="2024-12-13T14:15:31.501280509Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.501484 env[1927]: time="2024-12-13T14:15:31.501453106Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.501616 env[1927]: time="2024-12-13T14:15:31.501584418Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.501740 env[1927]: time="2024-12-13T14:15:31.501710450Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:15:31.502094 env[1927]: time="2024-12-13T14:15:31.502060875Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:15:31.502490 env[1927]: time="2024-12-13T14:15:31.502443723Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:15:31.503375 env[1927]: time="2024-12-13T14:15:31.503337812Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:15:31.510542 env[1927]: time="2024-12-13T14:15:31.510485952Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.510914 env[1927]: time="2024-12-13T14:15:31.510868935Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:15:31.511215 env[1927]: time="2024-12-13T14:15:31.511182593Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.511411 env[1927]: time="2024-12-13T14:15:31.511378565Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.511565 env[1927]: time="2024-12-13T14:15:31.511534126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.511704 env[1927]: time="2024-12-13T14:15:31.511673932Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.511854 env[1927]: time="2024-12-13T14:15:31.511824459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.511988 env[1927]: time="2024-12-13T14:15:31.511958479Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.512114 env[1927]: time="2024-12-13T14:15:31.512084671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.512238 env[1927]: time="2024-12-13T14:15:31.512207675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.512411 env[1927]: time="2024-12-13T14:15:31.512381011Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:15:31.512902 env[1927]: time="2024-12-13T14:15:31.512857567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.513655 env[1927]: time="2024-12-13T14:15:31.513611740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.513865 env[1927]: time="2024-12-13T14:15:31.513793963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.514020 env[1927]: time="2024-12-13T14:15:31.513989897Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:15:31.514195 env[1927]: time="2024-12-13T14:15:31.514157632Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:15:31.521917 env[1927]: time="2024-12-13T14:15:31.521840303Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:15:31.522482 env[1927]: time="2024-12-13T14:15:31.522434275Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:15:31.522667 env[1927]: time="2024-12-13T14:15:31.522636278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:15:31.523218 env[1927]: time="2024-12-13T14:15:31.523084006Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:15:31.525941 env[1927]: time="2024-12-13T14:15:31.525823229Z" level=info msg="Connect containerd service" Dec 13 14:15:31.530559 env[1927]: time="2024-12-13T14:15:31.530389455Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:15:31.533202 env[1927]: time="2024-12-13T14:15:31.533138328Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:15:31.534043 env[1927]: time="2024-12-13T14:15:31.533977717Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:15:31.540532 env[1927]: time="2024-12-13T14:15:31.536341848Z" level=info msg="Start subscribing containerd event" Dec 13 14:15:31.540671 env[1927]: time="2024-12-13T14:15:31.540574905Z" level=info msg="Start recovering state" Dec 13 14:15:31.540793 env[1927]: time="2024-12-13T14:15:31.540752659Z" level=info msg="Start event monitor" Dec 13 14:15:31.540864 env[1927]: time="2024-12-13T14:15:31.540830046Z" level=info msg="Start snapshots syncer" Dec 13 14:15:31.540925 env[1927]: time="2024-12-13T14:15:31.540862087Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:15:31.540925 env[1927]: time="2024-12-13T14:15:31.540884452Z" level=info msg="Start streaming server" Dec 13 14:15:31.541123 env[1927]: time="2024-12-13T14:15:31.540502479Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:15:31.543096 env[1927]: time="2024-12-13T14:15:31.541233203Z" level=info msg="containerd successfully booted in 0.332870s" Dec 13 14:15:31.541452 systemd[1]: Started containerd.service. Dec 13 14:15:31.556066 systemd-logind[1899]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:15:31.556128 systemd-logind[1899]: Watching system buttons on /dev/input/event1 (Sleep Button) Dec 13 14:15:31.564467 systemd-logind[1899]: New seat seat0. Dec 13 14:15:31.582740 systemd[1]: Started systemd-logind.service. Dec 13 14:15:31.704334 dbus-daemon[1893]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:15:31.704655 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:15:31.708548 dbus-daemon[1893]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1960 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:31.733501 systemd[1]: Starting polkit.service... Dec 13 14:15:31.777951 polkitd[2003]: Started polkitd version 121 Dec 13 14:15:31.825625 polkitd[2003]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:15:31.825755 polkitd[2003]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:15:31.834494 polkitd[2003]: Finished loading, compiling and executing 2 rules Dec 13 14:15:31.838698 dbus-daemon[1893]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:15:31.838960 systemd[1]: Started polkit.service. Dec 13 14:15:31.840916 polkitd[2003]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:15:31.914966 systemd-resolved[1844]: System hostname changed to 'ip-172-31-19-77'. Dec 13 14:15:31.914971 systemd-hostnamed[1960]: Hostname set to (transient) Dec 13 14:15:31.979376 coreos-metadata[1892]: Dec 13 14:15:31.979 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:15:31.982846 coreos-metadata[1892]: Dec 13 14:15:31.982 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:15:31.985961 coreos-metadata[1892]: Dec 13 14:15:31.985 INFO Fetch successful Dec 13 14:15:31.985961 coreos-metadata[1892]: Dec 13 14:15:31.985 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:15:31.987379 coreos-metadata[1892]: Dec 13 14:15:31.987 INFO Fetch successful Dec 13 14:15:32.003316 unknown[1892]: wrote ssh authorized keys file for user: core Dec 13 14:15:32.019793 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Create new startup processor Dec 13 14:15:32.030947 update-ssh-keys[2057]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:32.032476 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:15:32.039712 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing bookkeeping folders Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO removing the completed state files Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing healthcheck folders for long running plugins Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing locations for inventory plugin Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing default location for custom inventory Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing default location for file inventory Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Initializing default location for role inventory Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Init the cloudwatchlogs publisher Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:15:32.050457 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:15:32.051639 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:15:32.051639 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO OS: linux, Arch: arm64 Dec 13 14:15:32.058880 amazon-ssm-agent[1904]: datastore file /var/lib/amazon/ssm/i-018bcf8ab042b2423/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:15:32.131073 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:15:32.225930 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:15:32.325087 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:15:32.415130 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:15:32.509822 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:15:32.604745 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:15:32.663373 locksmithd[1963]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:15:32.699910 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-018bcf8ab042b2423, requestId: 2857db92-ea73-4920-9b58-1d6d7083f0ce Dec 13 14:15:32.795250 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [OfflineService] Starting document processing engine... Dec 13 14:15:32.890743 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:15:32.986550 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:15:33.034887 systemd[1]: Started kubelet.service. Dec 13 14:15:33.082409 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [OfflineService] Starting message polling Dec 13 14:15:33.178572 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [OfflineService] Starting send replies to MDS Dec 13 14:15:33.274909 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:15:33.371499 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:15:33.468163 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:15:33.565224 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:15:33.662552 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:15:33.760034 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [instanceID=i-018bcf8ab042b2423] Starting association polling Dec 13 14:15:33.857459 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:15:33.920216 kubelet[2116]: E1213 14:15:33.920094 2116 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:15:33.925131 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:15:33.925622 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:15:33.955220 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:15:34.053135 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:15:34.151575 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:15:34.250010 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:15:34.348450 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:15:34.447242 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] listening reply. Dec 13 14:15:34.546010 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:15:34.645152 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:15:34.744495 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:15:34.843943 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:15:34.943571 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-018bcf8ab042b2423?role=subscribe&stream=input Dec 13 14:15:35.043981 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-018bcf8ab042b2423?role=subscribe&stream=input Dec 13 14:15:35.144038 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:15:35.245751 amazon-ssm-agent[1904]: 2024-12-13 14:15:32 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:15:38.319466 sshd_keygen[1943]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:15:38.357605 systemd[1]: Finished sshd-keygen.service. Dec 13 14:15:38.363755 systemd[1]: Starting issuegen.service... Dec 13 14:15:38.380329 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:15:38.380869 systemd[1]: Finished issuegen.service. Dec 13 14:15:38.386715 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:15:38.403592 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:15:38.410745 systemd[1]: Started getty@tty1.service. Dec 13 14:15:38.416027 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:15:38.418355 systemd[1]: Reached target getty.target. Dec 13 14:15:38.420355 systemd[1]: Reached target multi-user.target. Dec 13 14:15:38.425249 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:15:38.440083 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:15:38.440858 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:15:38.444450 systemd[1]: Startup finished in 10.158s (kernel) + 16.918s (userspace) = 27.077s. Dec 13 14:15:39.736922 systemd[1]: Created slice system-sshd.slice. Dec 13 14:15:39.739570 systemd[1]: Started sshd@0-172.31.19.77:22-139.178.89.65:37350.service. Dec 13 14:15:40.001392 sshd[2141]: Accepted publickey for core from 139.178.89.65 port 37350 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:40.007314 sshd[2141]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:40.030625 systemd[1]: Created slice user-500.slice. Dec 13 14:15:40.033525 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:15:40.042432 systemd-logind[1899]: New session 1 of user core. Dec 13 14:15:40.059490 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:15:40.064824 systemd[1]: Starting user@500.service... Dec 13 14:15:40.076903 (systemd)[2146]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:40.281256 systemd[2146]: Queued start job for default target default.target. Dec 13 14:15:40.282914 systemd[2146]: Reached target paths.target. Dec 13 14:15:40.283225 systemd[2146]: Reached target sockets.target. Dec 13 14:15:40.283428 systemd[2146]: Reached target timers.target. Dec 13 14:15:40.283578 systemd[2146]: Reached target basic.target. Dec 13 14:15:40.283799 systemd[2146]: Reached target default.target. Dec 13 14:15:40.283927 systemd[1]: Started user@500.service. Dec 13 14:15:40.285358 systemd[2146]: Startup finished in 194ms. Dec 13 14:15:40.285916 systemd[1]: Started session-1.scope. Dec 13 14:15:40.432132 systemd[1]: Started sshd@1-172.31.19.77:22-139.178.89.65:37352.service. Dec 13 14:15:40.611374 sshd[2155]: Accepted publickey for core from 139.178.89.65 port 37352 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:40.613930 sshd[2155]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:40.621159 systemd-logind[1899]: New session 2 of user core. Dec 13 14:15:40.623196 systemd[1]: Started session-2.scope. Dec 13 14:15:40.758645 sshd[2155]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:40.764199 systemd-logind[1899]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:15:40.764805 systemd[1]: sshd@1-172.31.19.77:22-139.178.89.65:37352.service: Deactivated successfully. Dec 13 14:15:40.766312 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:15:40.767633 systemd-logind[1899]: Removed session 2. Dec 13 14:15:40.785140 systemd[1]: Started sshd@2-172.31.19.77:22-139.178.89.65:37362.service. Dec 13 14:15:40.965606 sshd[2162]: Accepted publickey for core from 139.178.89.65 port 37362 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:40.967478 sshd[2162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:40.975610 systemd-logind[1899]: New session 3 of user core. Dec 13 14:15:40.976558 systemd[1]: Started session-3.scope. Dec 13 14:15:41.102972 sshd[2162]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:41.107738 systemd[1]: sshd@2-172.31.19.77:22-139.178.89.65:37362.service: Deactivated successfully. Dec 13 14:15:41.109094 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:15:41.111754 systemd-logind[1899]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:15:41.114456 systemd-logind[1899]: Removed session 3. Dec 13 14:15:41.129077 systemd[1]: Started sshd@3-172.31.19.77:22-139.178.89.65:37374.service. Dec 13 14:15:41.308027 sshd[2169]: Accepted publickey for core from 139.178.89.65 port 37374 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:41.311163 sshd[2169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:41.318977 systemd-logind[1899]: New session 4 of user core. Dec 13 14:15:41.319863 systemd[1]: Started session-4.scope. Dec 13 14:15:41.456364 sshd[2169]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:41.461741 systemd[1]: sshd@3-172.31.19.77:22-139.178.89.65:37374.service: Deactivated successfully. Dec 13 14:15:41.463264 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:15:41.466009 systemd-logind[1899]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:15:41.468904 systemd-logind[1899]: Removed session 4. Dec 13 14:15:41.482155 systemd[1]: Started sshd@4-172.31.19.77:22-139.178.89.65:37376.service. Dec 13 14:15:41.662402 sshd[2176]: Accepted publickey for core from 139.178.89.65 port 37376 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:41.665477 sshd[2176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:41.674010 systemd[1]: Started session-5.scope. Dec 13 14:15:41.674892 systemd-logind[1899]: New session 5 of user core. Dec 13 14:15:41.825846 sudo[2180]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:15:41.826950 sudo[2180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:41.873674 dbus-daemon[1893]: avc: received setenforce notice (enforcing=1) Dec 13 14:15:41.876749 sudo[2180]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:41.902703 sshd[2176]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:41.908823 systemd-logind[1899]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:15:41.909941 systemd[1]: sshd@4-172.31.19.77:22-139.178.89.65:37376.service: Deactivated successfully. Dec 13 14:15:41.913037 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:15:41.915590 systemd-logind[1899]: Removed session 5. Dec 13 14:15:41.928586 systemd[1]: Started sshd@5-172.31.19.77:22-139.178.89.65:37378.service. Dec 13 14:15:42.106158 sshd[2184]: Accepted publickey for core from 139.178.89.65 port 37378 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:42.109056 sshd[2184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:42.118495 systemd[1]: Started session-6.scope. Dec 13 14:15:42.119264 systemd-logind[1899]: New session 6 of user core. Dec 13 14:15:42.232034 sudo[2189]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:15:42.233183 sudo[2189]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:42.239160 sudo[2189]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:42.248814 sudo[2188]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:15:42.249399 sudo[2188]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:42.266705 systemd[1]: Stopping audit-rules.service... Dec 13 14:15:42.267000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:42.270895 kernel: kauditd_printk_skb: 58 callbacks suppressed Dec 13 14:15:42.270955 kernel: audit: type=1305 audit(1734099342.267:150): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:42.275855 auditctl[2192]: No rules Dec 13 14:15:42.267000 audit[2192]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff3024010 a2=420 a3=0 items=0 ppid=1 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.277003 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:15:42.277534 systemd[1]: Stopped audit-rules.service. Dec 13 14:15:42.282986 systemd[1]: Starting audit-rules.service... Dec 13 14:15:42.292412 kernel: audit: type=1300 audit(1734099342.267:150): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff3024010 a2=420 a3=0 items=0 ppid=1 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.267000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:42.297007 kernel: audit: type=1327 audit(1734099342.267:150): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:42.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.304549 kernel: audit: type=1131 audit(1734099342.275:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.323636 augenrules[2210]: No rules Dec 13 14:15:42.325700 systemd[1]: Finished audit-rules.service. Dec 13 14:15:42.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.327760 sudo[2188]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:42.324000 audit[2188]: USER_END pid=2188 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.334419 kernel: audit: type=1130 audit(1734099342.324:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.324000 audit[2188]: CRED_DISP pid=2188 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.350624 kernel: audit: type=1106 audit(1734099342.324:153): pid=2188 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.350719 kernel: audit: type=1104 audit(1734099342.324:154): pid=2188 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.356007 sshd[2184]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:42.356000 audit[2184]: USER_END pid=2184 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.361245 systemd-logind[1899]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:15:42.356000 audit[2184]: CRED_DISP pid=2184 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.362940 systemd[1]: sshd@5-172.31.19.77:22-139.178.89.65:37378.service: Deactivated successfully. Dec 13 14:15:42.364396 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:15:42.366493 systemd-logind[1899]: Removed session 6. Dec 13 14:15:42.377914 kernel: audit: type=1106 audit(1734099342.356:155): pid=2184 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.378048 kernel: audit: type=1104 audit(1734099342.356:156): pid=2184 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.77:22-139.178.89.65:37378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.385810 systemd[1]: Started sshd@6-172.31.19.77:22-139.178.89.65:37382.service. Dec 13 14:15:42.387089 kernel: audit: type=1131 audit(1734099342.357:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.77:22-139.178.89.65:37378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.77:22-139.178.89.65:37382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.563000 audit[2217]: USER_ACCT pid=2217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.565257 sshd[2217]: Accepted publickey for core from 139.178.89.65 port 37382 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:42.566000 audit[2217]: CRED_ACQ pid=2217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.566000 audit[2217]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfaa5350 a2=3 a3=1 items=0 ppid=1 pid=2217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.566000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:42.567781 sshd[2217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:42.576079 systemd-logind[1899]: New session 7 of user core. Dec 13 14:15:42.577038 systemd[1]: Started session-7.scope. Dec 13 14:15:42.588000 audit[2217]: USER_START pid=2217 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.592000 audit[2220]: CRED_ACQ pid=2220 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:42.686000 audit[2221]: USER_ACCT pid=2221 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.688357 sudo[2221]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:15:42.687000 audit[2221]: CRED_REFR pid=2221 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.689675 sudo[2221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:42.692000 audit[2221]: USER_START pid=2221 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.715491 systemd[1]: Starting coreos-metadata.service... Dec 13 14:15:42.882578 coreos-metadata[2225]: Dec 13 14:15:42.882 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:15:42.883719 coreos-metadata[2225]: Dec 13 14:15:42.883 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Dec 13 14:15:42.884502 coreos-metadata[2225]: Dec 13 14:15:42.884 INFO Fetch successful Dec 13 14:15:42.884926 coreos-metadata[2225]: Dec 13 14:15:42.884 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Dec 13 14:15:42.885263 coreos-metadata[2225]: Dec 13 14:15:42.885 INFO Fetch successful Dec 13 14:15:42.885614 coreos-metadata[2225]: Dec 13 14:15:42.885 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Dec 13 14:15:42.886104 coreos-metadata[2225]: Dec 13 14:15:42.885 INFO Fetch successful Dec 13 14:15:42.886446 coreos-metadata[2225]: Dec 13 14:15:42.886 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Dec 13 14:15:42.886877 coreos-metadata[2225]: Dec 13 14:15:42.886 INFO Fetch successful Dec 13 14:15:42.887196 coreos-metadata[2225]: Dec 13 14:15:42.887 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Dec 13 14:15:42.887759 coreos-metadata[2225]: Dec 13 14:15:42.887 INFO Fetch successful Dec 13 14:15:42.888087 coreos-metadata[2225]: Dec 13 14:15:42.887 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Dec 13 14:15:42.888510 coreos-metadata[2225]: Dec 13 14:15:42.888 INFO Fetch successful Dec 13 14:15:42.888833 coreos-metadata[2225]: Dec 13 14:15:42.888 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Dec 13 14:15:42.889337 coreos-metadata[2225]: Dec 13 14:15:42.889 INFO Fetch successful Dec 13 14:15:42.889650 coreos-metadata[2225]: Dec 13 14:15:42.889 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Dec 13 14:15:42.890016 coreos-metadata[2225]: Dec 13 14:15:42.889 INFO Fetch successful Dec 13 14:15:42.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.910529 systemd[1]: Finished coreos-metadata.service. Dec 13 14:15:44.041678 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:44.043700 systemd[1]: Stopped kubelet.service. Dec 13 14:15:44.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.049182 systemd[1]: Starting kubelet.service... Dec 13 14:15:44.253107 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:15:44.253561 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:15:44.254643 systemd[1]: Stopped kubelet.service. Dec 13 14:15:44.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:15:44.262631 systemd[1]: Starting kubelet.service... Dec 13 14:15:44.321690 systemd[1]: Reloading. Dec 13 14:15:44.459403 /usr/lib/systemd/system-generators/torcx-generator[2295]: time="2024-12-13T14:15:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:44.466025 /usr/lib/systemd/system-generators/torcx-generator[2295]: time="2024-12-13T14:15:44Z" level=info msg="torcx already run" Dec 13 14:15:44.714696 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:44.714740 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:44.761983 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:44.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.997562 systemd[1]: Started kubelet.service. Dec 13 14:15:45.003195 systemd[1]: Stopping kubelet.service... Dec 13 14:15:45.005650 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:15:45.006231 systemd[1]: Stopped kubelet.service. Dec 13 14:15:45.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.013066 systemd[1]: Starting kubelet.service... Dec 13 14:15:45.565348 systemd[1]: Started kubelet.service. Dec 13 14:15:45.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.673474 kubelet[2369]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:15:45.674392 kubelet[2369]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:15:45.674545 kubelet[2369]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:15:45.674814 kubelet[2369]: I1213 14:15:45.674749 2369 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:15:47.470955 kubelet[2369]: I1213 14:15:47.470889 2369 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:15:47.470955 kubelet[2369]: I1213 14:15:47.470945 2369 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:15:47.471693 kubelet[2369]: I1213 14:15:47.471357 2369 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:15:47.512193 kubelet[2369]: I1213 14:15:47.512049 2369 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:15:47.536588 kubelet[2369]: I1213 14:15:47.536544 2369 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:15:47.540984 kubelet[2369]: I1213 14:15:47.540943 2369 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:15:47.541985 kubelet[2369]: I1213 14:15:47.541893 2369 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:15:47.542591 kubelet[2369]: I1213 14:15:47.542562 2369 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:15:47.542706 kubelet[2369]: I1213 14:15:47.542685 2369 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:15:47.545555 kubelet[2369]: I1213 14:15:47.545515 2369 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:15:47.551867 kubelet[2369]: I1213 14:15:47.551820 2369 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:15:47.552095 kubelet[2369]: I1213 14:15:47.552065 2369 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:15:47.552255 kubelet[2369]: I1213 14:15:47.552229 2369 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:15:47.552478 kubelet[2369]: E1213 14:15:47.552436 2369 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:47.552647 kubelet[2369]: E1213 14:15:47.552519 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:47.552766 kubelet[2369]: I1213 14:15:47.552454 2369 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:15:47.554793 kubelet[2369]: I1213 14:15:47.554725 2369 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:15:47.556464 kubelet[2369]: I1213 14:15:47.556425 2369 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:15:47.557993 kubelet[2369]: W1213 14:15:47.557914 2369 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:15:47.559821 kubelet[2369]: I1213 14:15:47.559705 2369 server.go:1256] "Started kubelet" Dec 13 14:15:47.573775 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:15:47.573908 kernel: audit: type=1400 audit(1734099347.566:174): avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:47.566000 audit[2369]: AVC avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:47.574066 kubelet[2369]: I1213 14:15:47.573335 2369 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:15:47.574066 kubelet[2369]: I1213 14:15:47.573472 2369 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:15:47.566000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:47.580889 kernel: audit: type=1401 audit(1734099347.566:174): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:47.580976 kernel: audit: type=1300 audit(1734099347.566:174): arch=c00000b7 syscall=5 success=no exit=-22 a0=40008efa70 a1=4000a80f00 a2=40008efa40 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.566000 audit[2369]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008efa70 a1=4000a80f00 a2=40008efa40 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.566000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:47.592753 kubelet[2369]: I1213 14:15:47.592715 2369 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:15:47.594331 kubelet[2369]: I1213 14:15:47.594296 2369 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:15:47.596180 kubelet[2369]: I1213 14:15:47.596140 2369 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:15:47.596725 kubelet[2369]: I1213 14:15:47.596693 2369 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:15:47.602157 kernel: audit: type=1327 audit(1734099347.566:174): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:47.568000 audit[2369]: AVC avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:47.603712 kubelet[2369]: I1213 14:15:47.603674 2369 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:15:47.604169 kubelet[2369]: I1213 14:15:47.604142 2369 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:15:47.604489 kubelet[2369]: I1213 14:15:47.604464 2369 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:15:47.604721 kubelet[2369]: I1213 14:15:47.604700 2369 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:15:47.608035 kubelet[2369]: E1213 14:15:47.607992 2369 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:15:47.610003 kernel: audit: type=1400 audit(1734099347.568:175): avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:47.568000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:47.614343 kernel: audit: type=1401 audit(1734099347.568:175): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:47.568000 audit[2369]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ce3560 a1=4000a80f18 a2=40008efb00 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.625607 kernel: audit: type=1300 audit(1734099347.568:175): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ce3560 a1=4000a80f18 a2=40008efb00 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.568000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:47.627538 kubelet[2369]: I1213 14:15:47.627489 2369 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:15:47.636416 kernel: audit: type=1327 audit(1734099347.568:175): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:47.638317 kubelet[2369]: I1213 14:15:47.638240 2369 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:15:47.638603 kubelet[2369]: I1213 14:15:47.638573 2369 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:15:47.641920 kubelet[2369]: E1213 14:15:47.641861 2369 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.19.77\" not found" node="172.31.19.77" Dec 13 14:15:47.694098 kubelet[2369]: I1213 14:15:47.694046 2369 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:15:47.694098 kubelet[2369]: I1213 14:15:47.694086 2369 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:15:47.694344 kubelet[2369]: I1213 14:15:47.694124 2369 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:15:47.696749 kubelet[2369]: I1213 14:15:47.696695 2369 policy_none.go:49] "None policy: Start" Dec 13 14:15:47.697944 kubelet[2369]: I1213 14:15:47.697906 2369 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:15:47.698074 kubelet[2369]: I1213 14:15:47.697983 2369 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:15:47.710325 kubelet[2369]: I1213 14:15:47.709972 2369 kubelet_node_status.go:73] "Attempting to register node" node="172.31.19.77" Dec 13 14:15:47.714799 kubelet[2369]: I1213 14:15:47.714743 2369 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:15:47.713000 audit[2369]: AVC avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:47.722198 kubelet[2369]: I1213 14:15:47.722051 2369 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:15:47.724939 kubelet[2369]: I1213 14:15:47.724891 2369 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:15:47.713000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:47.730970 kernel: audit: type=1400 audit(1734099347.713:176): avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:47.731103 kernel: audit: type=1401 audit(1734099347.713:176): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:15:47.713000 audit[2369]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f0cfc0 a1=4000dbac18 a2=4000f0cf90 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.713000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:15:47.726000 audit[2385]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.726000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce664fd0 a2=0 a3=1 items=0 ppid=2369 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:15:47.733646 kubelet[2369]: I1213 14:15:47.733590 2369 kubelet_node_status.go:76] "Successfully registered node" node="172.31.19.77" Dec 13 14:15:47.745000 audit[2387]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.745000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc2df1510 a2=0 a3=1 items=0 ppid=2369 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:15:47.754613 kubelet[2369]: I1213 14:15:47.754579 2369 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:15:47.755753 env[1927]: time="2024-12-13T14:15:47.755492359Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:15:47.756744 kubelet[2369]: I1213 14:15:47.756710 2369 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:15:47.758000 audit[2389]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.758000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe9d98d90 a2=0 a3=1 items=0 ppid=2369 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:47.792000 audit[2394]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.792000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffceb2ccc0 a2=0 a3=1 items=0 ppid=2369 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:47.888000 audit[2399]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.888000 audit[2399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdb2a9100 a2=0 a3=1 items=0 ppid=2369 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:15:47.890582 kubelet[2369]: I1213 14:15:47.890481 2369 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:15:47.891000 audit[2400]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:47.891000 audit[2400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffed69bef0 a2=0 a3=1 items=0 ppid=2369 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:15:47.894068 kubelet[2369]: I1213 14:15:47.894031 2369 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:15:47.894313 kubelet[2369]: I1213 14:15:47.894240 2369 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:15:47.894482 kubelet[2369]: I1213 14:15:47.894457 2369 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:15:47.895007 kubelet[2369]: E1213 14:15:47.894947 2369 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:15:47.894000 audit[2401]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.894000 audit[2401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd77f4740 a2=0 a3=1 items=0 ppid=2369 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:15:47.896000 audit[2402]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.896000 audit[2402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd6ad51d0 a2=0 a3=1 items=0 ppid=2369 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:15:47.897000 audit[2403]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:47.897000 audit[2403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc48d3f70 a2=0 a3=1 items=0 ppid=2369 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:15:47.899000 audit[2404]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:47.899000 audit[2404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff371ad70 a2=0 a3=1 items=0 ppid=2369 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:15:47.901000 audit[2405]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:47.901000 audit[2405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdacd2d60 a2=0 a3=1 items=0 ppid=2369 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:15:47.904000 audit[2406]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:47.904000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeca3c6d0 a2=0 a3=1 items=0 ppid=2369 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:47.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:15:48.473955 kubelet[2369]: I1213 14:15:48.473880 2369 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:15:48.474612 kubelet[2369]: W1213 14:15:48.474138 2369 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:15:48.474612 kubelet[2369]: W1213 14:15:48.474192 2369 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:15:48.474612 kubelet[2369]: W1213 14:15:48.474363 2369 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:15:48.553182 kubelet[2369]: E1213 14:15:48.553102 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:48.554297 kubelet[2369]: I1213 14:15:48.554225 2369 apiserver.go:52] "Watching apiserver" Dec 13 14:15:48.559978 kubelet[2369]: I1213 14:15:48.559935 2369 topology_manager.go:215] "Topology Admit Handler" podUID="d033501d-6b6f-4ad8-8750-db817b164e3f" podNamespace="calico-system" podName="calico-node-gz6gk" Dec 13 14:15:48.560390 kubelet[2369]: I1213 14:15:48.560361 2369 topology_manager.go:215] "Topology Admit Handler" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" podNamespace="calico-system" podName="csi-node-driver-645pl" Dec 13 14:15:48.560667 kubelet[2369]: I1213 14:15:48.560639 2369 topology_manager.go:215] "Topology Admit Handler" podUID="ced989af-4005-4560-b999-b7b8bb68ce9d" podNamespace="kube-system" podName="kube-proxy-hs4n7" Dec 13 14:15:48.562048 kubelet[2369]: E1213 14:15:48.560923 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:15:48.605952 kubelet[2369]: I1213 14:15:48.605881 2369 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:15:48.609836 kubelet[2369]: I1213 14:15:48.609795 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z4k8f\" (UniqueName: \"kubernetes.io/projected/ced989af-4005-4560-b999-b7b8bb68ce9d-kube-api-access-z4k8f\") pod \"kube-proxy-hs4n7\" (UID: \"ced989af-4005-4560-b999-b7b8bb68ce9d\") " pod="kube-system/kube-proxy-hs4n7" Dec 13 14:15:48.610126 kubelet[2369]: I1213 14:15:48.610100 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d033501d-6b6f-4ad8-8750-db817b164e3f-node-certs\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.610345 kubelet[2369]: I1213 14:15:48.610321 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-var-run-calico\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.610514 kubelet[2369]: I1213 14:15:48.610493 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-cni-bin-dir\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.610710 kubelet[2369]: I1213 14:15:48.610687 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sw5hq\" (UniqueName: \"kubernetes.io/projected/9095e889-31e1-45f0-9e43-c10febbc39bc-kube-api-access-sw5hq\") pod \"csi-node-driver-645pl\" (UID: \"9095e889-31e1-45f0-9e43-c10febbc39bc\") " pod="calico-system/csi-node-driver-645pl" Dec 13 14:15:48.610871 kubelet[2369]: I1213 14:15:48.610848 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ced989af-4005-4560-b999-b7b8bb68ce9d-kube-proxy\") pod \"kube-proxy-hs4n7\" (UID: \"ced989af-4005-4560-b999-b7b8bb68ce9d\") " pod="kube-system/kube-proxy-hs4n7" Dec 13 14:15:48.611026 kubelet[2369]: I1213 14:15:48.611005 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ced989af-4005-4560-b999-b7b8bb68ce9d-xtables-lock\") pod \"kube-proxy-hs4n7\" (UID: \"ced989af-4005-4560-b999-b7b8bb68ce9d\") " pod="kube-system/kube-proxy-hs4n7" Dec 13 14:15:48.611182 kubelet[2369]: I1213 14:15:48.611161 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-policysync\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.611365 kubelet[2369]: I1213 14:15:48.611344 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d033501d-6b6f-4ad8-8750-db817b164e3f-tigera-ca-bundle\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.611546 kubelet[2369]: I1213 14:15:48.611524 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-flexvol-driver-host\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.611703 kubelet[2369]: I1213 14:15:48.611681 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9zc5z\" (UniqueName: \"kubernetes.io/projected/d033501d-6b6f-4ad8-8750-db817b164e3f-kube-api-access-9zc5z\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.611852 kubelet[2369]: I1213 14:15:48.611831 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9095e889-31e1-45f0-9e43-c10febbc39bc-varrun\") pod \"csi-node-driver-645pl\" (UID: \"9095e889-31e1-45f0-9e43-c10febbc39bc\") " pod="calico-system/csi-node-driver-645pl" Dec 13 14:15:48.612006 kubelet[2369]: I1213 14:15:48.611984 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9095e889-31e1-45f0-9e43-c10febbc39bc-registration-dir\") pod \"csi-node-driver-645pl\" (UID: \"9095e889-31e1-45f0-9e43-c10febbc39bc\") " pod="calico-system/csi-node-driver-645pl" Dec 13 14:15:48.612159 kubelet[2369]: I1213 14:15:48.612138 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ced989af-4005-4560-b999-b7b8bb68ce9d-lib-modules\") pod \"kube-proxy-hs4n7\" (UID: \"ced989af-4005-4560-b999-b7b8bb68ce9d\") " pod="kube-system/kube-proxy-hs4n7" Dec 13 14:15:48.612352 kubelet[2369]: I1213 14:15:48.612329 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-lib-modules\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.612520 kubelet[2369]: I1213 14:15:48.612491 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-xtables-lock\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.612673 kubelet[2369]: I1213 14:15:48.612652 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-var-lib-calico\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.612830 kubelet[2369]: I1213 14:15:48.612808 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9095e889-31e1-45f0-9e43-c10febbc39bc-socket-dir\") pod \"csi-node-driver-645pl\" (UID: \"9095e889-31e1-45f0-9e43-c10febbc39bc\") " pod="calico-system/csi-node-driver-645pl" Dec 13 14:15:48.612989 kubelet[2369]: I1213 14:15:48.612967 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-cni-net-dir\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.613171 kubelet[2369]: I1213 14:15:48.613150 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d033501d-6b6f-4ad8-8750-db817b164e3f-cni-log-dir\") pod \"calico-node-gz6gk\" (UID: \"d033501d-6b6f-4ad8-8750-db817b164e3f\") " pod="calico-system/calico-node-gz6gk" Dec 13 14:15:48.613354 kubelet[2369]: I1213 14:15:48.613330 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9095e889-31e1-45f0-9e43-c10febbc39bc-kubelet-dir\") pod \"csi-node-driver-645pl\" (UID: \"9095e889-31e1-45f0-9e43-c10febbc39bc\") " pod="calico-system/csi-node-driver-645pl" Dec 13 14:15:48.717698 kubelet[2369]: E1213 14:15:48.717646 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.717698 kubelet[2369]: W1213 14:15:48.717686 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.717942 kubelet[2369]: E1213 14:15:48.717749 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.718153 kubelet[2369]: E1213 14:15:48.718106 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.718153 kubelet[2369]: W1213 14:15:48.718139 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.718316 kubelet[2369]: E1213 14:15:48.718175 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.718576 kubelet[2369]: E1213 14:15:48.718534 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.718576 kubelet[2369]: W1213 14:15:48.718564 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.718804 kubelet[2369]: E1213 14:15:48.718777 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.719032 kubelet[2369]: E1213 14:15:48.718888 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.719032 kubelet[2369]: W1213 14:15:48.719023 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.719398 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.734405 kubelet[2369]: W1213 14:15:48.719435 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.719491 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.719806 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.734405 kubelet[2369]: W1213 14:15:48.719823 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.719850 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.720099 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.734405 kubelet[2369]: W1213 14:15:48.720115 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.720140 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.734405 kubelet[2369]: E1213 14:15:48.720472 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.735063 kubelet[2369]: W1213 14:15:48.720488 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.720514 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.720559 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.720821 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.735063 kubelet[2369]: W1213 14:15:48.720836 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.720858 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.721103 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.735063 kubelet[2369]: W1213 14:15:48.721121 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.721144 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.735063 kubelet[2369]: E1213 14:15:48.721464 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.735655 kubelet[2369]: W1213 14:15:48.721480 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.735655 kubelet[2369]: E1213 14:15:48.721506 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.735655 kubelet[2369]: E1213 14:15:48.732709 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.735655 kubelet[2369]: W1213 14:15:48.732742 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.735655 kubelet[2369]: E1213 14:15:48.732778 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.742498 kubelet[2369]: E1213 14:15:48.742425 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.742498 kubelet[2369]: W1213 14:15:48.742484 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.742763 kubelet[2369]: E1213 14:15:48.742525 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.743062 kubelet[2369]: E1213 14:15:48.743015 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.743062 kubelet[2369]: W1213 14:15:48.743052 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.743220 kubelet[2369]: E1213 14:15:48.743088 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.746524 kubelet[2369]: E1213 14:15:48.746478 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.746776 kubelet[2369]: W1213 14:15:48.746738 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.747070 kubelet[2369]: E1213 14:15:48.747040 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.756423 kubelet[2369]: E1213 14:15:48.751781 2369 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:48.756423 kubelet[2369]: W1213 14:15:48.751823 2369 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:48.756423 kubelet[2369]: E1213 14:15:48.751862 2369 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:48.877989 env[1927]: time="2024-12-13T14:15:48.877778814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gz6gk,Uid:d033501d-6b6f-4ad8-8750-db817b164e3f,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:48.883987 env[1927]: time="2024-12-13T14:15:48.883854562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hs4n7,Uid:ced989af-4005-4560-b999-b7b8bb68ce9d,Namespace:kube-system,Attempt:0,}" Dec 13 14:15:49.100000 audit[2221]: USER_END pid=2221 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:49.100000 audit[2221]: CRED_DISP pid=2221 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:49.101920 sudo[2221]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:49.126605 sshd[2217]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:49.126000 audit[2217]: USER_END pid=2217 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:49.127000 audit[2217]: CRED_DISP pid=2217 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:49.132508 systemd-logind[1899]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:15:49.134047 systemd[1]: sshd@6-172.31.19.77:22-139.178.89.65:37382.service: Deactivated successfully. Dec 13 14:15:49.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.77:22-139.178.89.65:37382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:49.135904 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:15:49.138974 systemd-logind[1899]: Removed session 7. Dec 13 14:15:49.504876 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4227175414.mount: Deactivated successfully. Dec 13 14:15:49.525685 env[1927]: time="2024-12-13T14:15:49.525615097Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.527947 env[1927]: time="2024-12-13T14:15:49.527888617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.537348 env[1927]: time="2024-12-13T14:15:49.537244365Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.540602 env[1927]: time="2024-12-13T14:15:49.540467345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.550882 env[1927]: time="2024-12-13T14:15:49.550821279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.553846 env[1927]: time="2024-12-13T14:15:49.553787055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.554138 kubelet[2369]: E1213 14:15:49.554050 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:49.557787 env[1927]: time="2024-12-13T14:15:49.557715667Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.559863 env[1927]: time="2024-12-13T14:15:49.559795188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.584282 env[1927]: time="2024-12-13T14:15:49.581401001Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:49.584282 env[1927]: time="2024-12-13T14:15:49.581474768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:49.584282 env[1927]: time="2024-12-13T14:15:49.581501025Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:49.584282 env[1927]: time="2024-12-13T14:15:49.581909361Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309 pid=2439 runtime=io.containerd.runc.v2 Dec 13 14:15:49.632977 env[1927]: time="2024-12-13T14:15:49.628449766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:49.632977 env[1927]: time="2024-12-13T14:15:49.628920082Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:49.632977 env[1927]: time="2024-12-13T14:15:49.628970707Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:49.632977 env[1927]: time="2024-12-13T14:15:49.629474305Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ce9d793a99588227f805ff53c230b9694b193c8f525038ac1374db3276baab6 pid=2464 runtime=io.containerd.runc.v2 Dec 13 14:15:49.708517 env[1927]: time="2024-12-13T14:15:49.708458664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gz6gk,Uid:d033501d-6b6f-4ad8-8750-db817b164e3f,Namespace:calico-system,Attempt:0,} returns sandbox id \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\"" Dec 13 14:15:49.716529 env[1927]: time="2024-12-13T14:15:49.716475510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:15:49.762050 env[1927]: time="2024-12-13T14:15:49.761989487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hs4n7,Uid:ced989af-4005-4560-b999-b7b8bb68ce9d,Namespace:kube-system,Attempt:0,} returns sandbox id \"0ce9d793a99588227f805ff53c230b9694b193c8f525038ac1374db3276baab6\"" Dec 13 14:15:49.897226 kubelet[2369]: E1213 14:15:49.897172 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:15:50.554519 kubelet[2369]: E1213 14:15:50.554444 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:50.978909 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount701747612.mount: Deactivated successfully. Dec 13 14:15:51.192407 env[1927]: time="2024-12-13T14:15:51.192344748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:51.196528 env[1927]: time="2024-12-13T14:15:51.196472736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:51.200729 env[1927]: time="2024-12-13T14:15:51.200650937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:51.205458 env[1927]: time="2024-12-13T14:15:51.205384598Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:51.208193 env[1927]: time="2024-12-13T14:15:51.206883088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:15:51.210756 env[1927]: time="2024-12-13T14:15:51.210694649Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:15:51.214533 env[1927]: time="2024-12-13T14:15:51.214470579Z" level=info msg="CreateContainer within sandbox \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:15:51.250016 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount745614284.mount: Deactivated successfully. Dec 13 14:15:51.257447 env[1927]: time="2024-12-13T14:15:51.257331041Z" level=info msg="CreateContainer within sandbox \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4e603d8f8920f3ae4d75691d5fba1c0c1080996c16e1bd3f1c0651b389f8f315\"" Dec 13 14:15:51.259680 env[1927]: time="2024-12-13T14:15:51.259537482Z" level=info msg="StartContainer for \"4e603d8f8920f3ae4d75691d5fba1c0c1080996c16e1bd3f1c0651b389f8f315\"" Dec 13 14:15:51.377188 env[1927]: time="2024-12-13T14:15:51.372665978Z" level=info msg="StartContainer for \"4e603d8f8920f3ae4d75691d5fba1c0c1080996c16e1bd3f1c0651b389f8f315\" returns successfully" Dec 13 14:15:51.541792 env[1927]: time="2024-12-13T14:15:51.541455585Z" level=info msg="shim disconnected" id=4e603d8f8920f3ae4d75691d5fba1c0c1080996c16e1bd3f1c0651b389f8f315 Dec 13 14:15:51.542138 env[1927]: time="2024-12-13T14:15:51.542097035Z" level=warning msg="cleaning up after shim disconnected" id=4e603d8f8920f3ae4d75691d5fba1c0c1080996c16e1bd3f1c0651b389f8f315 namespace=k8s.io Dec 13 14:15:51.542395 env[1927]: time="2024-12-13T14:15:51.542362527Z" level=info msg="cleaning up dead shim" Dec 13 14:15:51.554675 kubelet[2369]: E1213 14:15:51.554616 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:51.561495 env[1927]: time="2024-12-13T14:15:51.561437811Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:15:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2559 runtime=io.containerd.runc.v2\n" Dec 13 14:15:51.895657 kubelet[2369]: E1213 14:15:51.895579 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:15:51.908745 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e603d8f8920f3ae4d75691d5fba1c0c1080996c16e1bd3f1c0651b389f8f315-rootfs.mount: Deactivated successfully. Dec 13 14:15:52.554995 kubelet[2369]: E1213 14:15:52.554909 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:52.769201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3595958350.mount: Deactivated successfully. Dec 13 14:15:53.555777 kubelet[2369]: E1213 14:15:53.555643 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:53.632621 env[1927]: time="2024-12-13T14:15:53.632532980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.636775 env[1927]: time="2024-12-13T14:15:53.636700114Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.639564 env[1927]: time="2024-12-13T14:15:53.639497743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.642333 env[1927]: time="2024-12-13T14:15:53.642231936Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.643542 env[1927]: time="2024-12-13T14:15:53.643485509Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 14:15:53.646253 env[1927]: time="2024-12-13T14:15:53.646194925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:15:53.649739 env[1927]: time="2024-12-13T14:15:53.649672235Z" level=info msg="CreateContainer within sandbox \"0ce9d793a99588227f805ff53c230b9694b193c8f525038ac1374db3276baab6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:15:53.674259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1395679067.mount: Deactivated successfully. Dec 13 14:15:53.697002 env[1927]: time="2024-12-13T14:15:53.696931300Z" level=info msg="CreateContainer within sandbox \"0ce9d793a99588227f805ff53c230b9694b193c8f525038ac1374db3276baab6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e3b8f928cc2c30ce933b0cb7171157da01d2c28b714f7951d15e836c70325fe6\"" Dec 13 14:15:53.698393 env[1927]: time="2024-12-13T14:15:53.698224599Z" level=info msg="StartContainer for \"e3b8f928cc2c30ce933b0cb7171157da01d2c28b714f7951d15e836c70325fe6\"" Dec 13 14:15:53.827610 env[1927]: time="2024-12-13T14:15:53.827485828Z" level=info msg="StartContainer for \"e3b8f928cc2c30ce933b0cb7171157da01d2c28b714f7951d15e836c70325fe6\" returns successfully" Dec 13 14:15:53.896303 kubelet[2369]: E1213 14:15:53.895926 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:15:53.952602 kubelet[2369]: I1213 14:15:53.952534 2369 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-hs4n7" podStartSLOduration=3.072789431 podStartE2EDuration="6.95243581s" podCreationTimestamp="2024-12-13 14:15:47 +0000 UTC" firstStartedPulling="2024-12-13 14:15:49.764600463 +0000 UTC m=+4.184449330" lastFinishedPulling="2024-12-13 14:15:53.64424683 +0000 UTC m=+8.064095709" observedRunningTime="2024-12-13 14:15:53.952010983 +0000 UTC m=+8.371859874" watchObservedRunningTime="2024-12-13 14:15:53.95243581 +0000 UTC m=+8.372284785" Dec 13 14:15:53.966381 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:15:53.966557 kernel: audit: type=1325 audit(1734099353.957:194): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:53.957000 audit[2634]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:53.957000 audit[2634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed71e410 a2=0 a3=1 items=0 ppid=2595 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.978709 kernel: audit: type=1300 audit(1734099353.957:194): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed71e410 a2=0 a3=1 items=0 ppid=2595 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:15:53.966000 audit[2636]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:53.990560 kernel: audit: type=1327 audit(1734099353.957:194): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:15:53.990687 kernel: audit: type=1325 audit(1734099353.966:195): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:53.966000 audit[2636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9d4a860 a2=0 a3=1 items=0 ppid=2595 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:15:54.007661 kernel: audit: type=1300 audit(1734099353.966:195): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9d4a860 a2=0 a3=1 items=0 ppid=2595 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.007798 kernel: audit: type=1327 audit(1734099353.966:195): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:15:53.971000 audit[2638]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:53.971000 audit[2638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5c09f60 a2=0 a3=1 items=0 ppid=2595 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.024901 kernel: audit: type=1325 audit(1734099353.971:196): table=nat:16 family=2 entries=1 op=nft_register_chain pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.025047 kernel: audit: type=1300 audit(1734099353.971:196): arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5c09f60 a2=0 a3=1 items=0 ppid=2595 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:15:54.030730 kernel: audit: type=1327 audit(1734099353.971:196): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:15:54.036847 kernel: audit: type=1325 audit(1734099353.971:197): table=filter:17 family=2 entries=1 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:53.971000 audit[2639]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:53.971000 audit[2639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff810b3c0 a2=0 a3=1 items=0 ppid=2595 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:15:53.976000 audit[2637]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:53.976000 audit[2637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd786df00 a2=0 a3=1 items=0 ppid=2595 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:15:53.978000 audit[2640]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:53.978000 audit[2640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca5cfe60 a2=0 a3=1 items=0 ppid=2595 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:53.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:15:54.064000 audit[2641]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.064000 audit[2641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffa9203f0 a2=0 a3=1 items=0 ppid=2595 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:15:54.070000 audit[2643]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.070000 audit[2643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffca693e40 a2=0 a3=1 items=0 ppid=2595 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:15:54.078000 audit[2646]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.078000 audit[2646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffef5f3060 a2=0 a3=1 items=0 ppid=2595 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:15:54.082000 audit[2647]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.082000 audit[2647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcebadb90 a2=0 a3=1 items=0 ppid=2595 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:15:54.088000 audit[2649]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.088000 audit[2649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe11d2750 a2=0 a3=1 items=0 ppid=2595 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:15:54.090000 audit[2650]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.090000 audit[2650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe87a5300 a2=0 a3=1 items=0 ppid=2595 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:15:54.096000 audit[2652]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.096000 audit[2652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe12da640 a2=0 a3=1 items=0 ppid=2595 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:15:54.105000 audit[2655]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.105000 audit[2655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffee954b60 a2=0 a3=1 items=0 ppid=2595 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:15:54.107000 audit[2656]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.107000 audit[2656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9f198d0 a2=0 a3=1 items=0 ppid=2595 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:15:54.113000 audit[2658]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.113000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff25ac030 a2=0 a3=1 items=0 ppid=2595 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:15:54.116000 audit[2659]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.116000 audit[2659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb258200 a2=0 a3=1 items=0 ppid=2595 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:15:54.122000 audit[2661]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.122000 audit[2661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9bc0450 a2=0 a3=1 items=0 ppid=2595 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:15:54.134000 audit[2664]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.134000 audit[2664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6649dc0 a2=0 a3=1 items=0 ppid=2595 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:15:54.143000 audit[2667]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.143000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd827c2a0 a2=0 a3=1 items=0 ppid=2595 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:15:54.145000 audit[2668]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.145000 audit[2668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff512cef0 a2=0 a3=1 items=0 ppid=2595 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:15:54.152000 audit[2670]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.152000 audit[2670]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe1c4e030 a2=0 a3=1 items=0 ppid=2595 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:54.207000 audit[2675]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.207000 audit[2675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffffe9e510 a2=0 a3=1 items=0 ppid=2595 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:54.210000 audit[2676]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.210000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd285e7d0 a2=0 a3=1 items=0 ppid=2595 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:15:54.217000 audit[2678]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:54.217000 audit[2678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe7cba8d0 a2=0 a3=1 items=0 ppid=2595 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:15:54.315000 audit[2684]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.315000 audit[2684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdf63c750 a2=0 a3=1 items=0 ppid=2595 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.356000 audit[2684]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.356000 audit[2684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=ffffdf63c750 a2=0 a3=1 items=0 ppid=2595 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.380000 audit[2693]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.380000 audit[2693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd0bbffe0 a2=0 a3=1 items=0 ppid=2595 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:15:54.388000 audit[2696]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.388000 audit[2696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe682a730 a2=0 a3=1 items=0 ppid=2595 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:15:54.395000 audit[2698]: NETFILTER_CFG table=filter:43 family=2 entries=10 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.395000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffddc5a7f0 a2=0 a3=1 items=0 ppid=2595 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.400000 audit[2698]: NETFILTER_CFG table=nat:44 family=2 entries=20 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.400000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffddc5a7f0 a2=0 a3=1 items=0 ppid=2595 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.405000 audit[2700]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.405000 audit[2700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcd88f000 a2=0 a3=1 items=0 ppid=2595 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:15:54.407000 audit[2701]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.407000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc37b1830 a2=0 a3=1 items=0 ppid=2595 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:15:54.413000 audit[2703]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.413000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe567fe60 a2=0 a3=1 items=0 ppid=2595 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:15:54.415000 audit[2704]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.415000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7e4fb00 a2=0 a3=1 items=0 ppid=2595 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:15:54.422000 audit[2706]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.422000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd23b55c0 a2=0 a3=1 items=0 ppid=2595 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:15:54.431000 audit[2709]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.431000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffeb772900 a2=0 a3=1 items=0 ppid=2595 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:15:54.433000 audit[2710]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.433000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0ce0df0 a2=0 a3=1 items=0 ppid=2595 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:15:54.439000 audit[2712]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.439000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa3e0fc0 a2=0 a3=1 items=0 ppid=2595 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:15:54.441000 audit[2713]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.441000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcafdb80 a2=0 a3=1 items=0 ppid=2595 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:15:54.449000 audit[2715]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.449000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeb41d140 a2=0 a3=1 items=0 ppid=2595 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:15:54.457000 audit[2718]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.457000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7ba1bc0 a2=0 a3=1 items=0 ppid=2595 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:15:54.466000 audit[2721]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.466000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2a087a0 a2=0 a3=1 items=0 ppid=2595 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:15:54.468000 audit[2722]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.468000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1d0d7d0 a2=0 a3=1 items=0 ppid=2595 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:15:54.473000 audit[2724]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.473000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc5856c70 a2=0 a3=1 items=0 ppid=2595 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:54.481000 audit[2727]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.481000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff927d010 a2=0 a3=1 items=0 ppid=2595 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:15:54.484000 audit[2728]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.484000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc21e9260 a2=0 a3=1 items=0 ppid=2595 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:15:54.490000 audit[2730]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.490000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdd9adcb0 a2=0 a3=1 items=0 ppid=2595 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:15:54.494000 audit[2731]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.494000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff275aad0 a2=0 a3=1 items=0 ppid=2595 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:15:54.501000 audit[2733]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.501000 audit[2733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd9262a10 a2=0 a3=1 items=0 ppid=2595 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:54.512000 audit[2736]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:15:54.512000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffbf0ac10 a2=0 a3=1 items=0 ppid=2595 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:15:54.522000 audit[2738]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:15:54.522000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff2ee6d80 a2=0 a3=1 items=0 ppid=2595 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.522000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.523000 audit[2738]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:15:54.523000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff2ee6d80 a2=0 a3=1 items=0 ppid=2595 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.523000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.556528 kubelet[2369]: E1213 14:15:54.556442 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:55.363000 audit[2740]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:55.363000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe31a4450 a2=0 a3=1 items=0 ppid=2595 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:55.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:55.369000 audit[2740]: NETFILTER_CFG table=nat:68 family=2 entries=20 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:55.369000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe31a4450 a2=0 a3=1 items=0 ppid=2595 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:55.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:55.557597 kubelet[2369]: E1213 14:15:55.557488 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:55.896016 kubelet[2369]: E1213 14:15:55.895974 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:15:56.558678 kubelet[2369]: E1213 14:15:56.558523 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:57.113733 amazon-ssm-agent[1904]: 2024-12-13 14:15:57 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:15:57.558898 kubelet[2369]: E1213 14:15:57.558737 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:57.895311 kubelet[2369]: E1213 14:15:57.895189 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:15:58.559300 kubelet[2369]: E1213 14:15:58.559176 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:59.001158 env[1927]: time="2024-12-13T14:15:59.001076810Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.005872 env[1927]: time="2024-12-13T14:15:59.005804271Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.009191 env[1927]: time="2024-12-13T14:15:59.009141894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.011609 env[1927]: time="2024-12-13T14:15:59.011545849Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:59.012894 env[1927]: time="2024-12-13T14:15:59.012844696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:15:59.017036 env[1927]: time="2024-12-13T14:15:59.016986019Z" level=info msg="CreateContainer within sandbox \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:15:59.039441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1543487939.mount: Deactivated successfully. Dec 13 14:15:59.047985 env[1927]: time="2024-12-13T14:15:59.047903645Z" level=info msg="CreateContainer within sandbox \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"350f2b5ca0cb6bcbe9a2d0a9e766c256312d2703eeea940b6c6fc5be9359323b\"" Dec 13 14:15:59.049172 env[1927]: time="2024-12-13T14:15:59.049074685Z" level=info msg="StartContainer for \"350f2b5ca0cb6bcbe9a2d0a9e766c256312d2703eeea940b6c6fc5be9359323b\"" Dec 13 14:15:59.179304 env[1927]: time="2024-12-13T14:15:59.175623915Z" level=info msg="StartContainer for \"350f2b5ca0cb6bcbe9a2d0a9e766c256312d2703eeea940b6c6fc5be9359323b\" returns successfully" Dec 13 14:15:59.560120 kubelet[2369]: E1213 14:15:59.560019 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:15:59.896740 kubelet[2369]: E1213 14:15:59.896063 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:16:00.561204 kubelet[2369]: E1213 14:16:00.561067 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:00.850136 env[1927]: time="2024-12-13T14:16:00.850064577Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:16:00.893753 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-350f2b5ca0cb6bcbe9a2d0a9e766c256312d2703eeea940b6c6fc5be9359323b-rootfs.mount: Deactivated successfully. Dec 13 14:16:00.939938 kubelet[2369]: I1213 14:16:00.939664 2369 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:16:01.561547 kubelet[2369]: E1213 14:16:01.561482 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:01.762155 kubelet[2369]: I1213 14:16:01.762088 2369 topology_manager.go:215] "Topology Admit Handler" podUID="4c74b746-886f-4cd3-91c5-2fef3dec6ea3" podNamespace="default" podName="nginx-deployment-6d5f899847-z46cn" Dec 13 14:16:01.836668 kubelet[2369]: I1213 14:16:01.836626 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hw6xc\" (UniqueName: \"kubernetes.io/projected/4c74b746-886f-4cd3-91c5-2fef3dec6ea3-kube-api-access-hw6xc\") pod \"nginx-deployment-6d5f899847-z46cn\" (UID: \"4c74b746-886f-4cd3-91c5-2fef3dec6ea3\") " pod="default/nginx-deployment-6d5f899847-z46cn" Dec 13 14:16:01.905028 env[1927]: time="2024-12-13T14:16:01.904940036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-645pl,Uid:9095e889-31e1-45f0-9e43-c10febbc39bc,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:01.944308 kernel: kauditd_printk_skb: 155 callbacks suppressed Dec 13 14:16:01.944467 kernel: audit: type=1131 audit(1734099361.940:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:01.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:01.940830 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:16:02.070635 env[1927]: time="2024-12-13T14:16:02.070191187Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-z46cn,Uid:4c74b746-886f-4cd3-91c5-2fef3dec6ea3,Namespace:default,Attempt:0,}" Dec 13 14:16:02.259818 env[1927]: time="2024-12-13T14:16:02.258131331Z" level=error msg="Failed to destroy network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.259818 env[1927]: time="2024-12-13T14:16:02.258834831Z" level=error msg="encountered an error cleaning up failed sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.259818 env[1927]: time="2024-12-13T14:16:02.258911254Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-645pl,Uid:9095e889-31e1-45f0-9e43-c10febbc39bc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.260108 kubelet[2369]: E1213 14:16:02.259238 2369 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.260108 kubelet[2369]: E1213 14:16:02.259352 2369 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-645pl" Dec 13 14:16:02.260108 kubelet[2369]: E1213 14:16:02.259394 2369 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-645pl" Dec 13 14:16:02.260360 kubelet[2369]: E1213 14:16:02.259475 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-645pl_calico-system(9095e889-31e1-45f0-9e43-c10febbc39bc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-645pl_calico-system(9095e889-31e1-45f0-9e43-c10febbc39bc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:16:02.262112 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd-shm.mount: Deactivated successfully. Dec 13 14:16:02.361955 env[1927]: time="2024-12-13T14:16:02.361887840Z" level=info msg="shim disconnected" id=350f2b5ca0cb6bcbe9a2d0a9e766c256312d2703eeea940b6c6fc5be9359323b Dec 13 14:16:02.362414 env[1927]: time="2024-12-13T14:16:02.362361146Z" level=warning msg="cleaning up after shim disconnected" id=350f2b5ca0cb6bcbe9a2d0a9e766c256312d2703eeea940b6c6fc5be9359323b namespace=k8s.io Dec 13 14:16:02.362657 env[1927]: time="2024-12-13T14:16:02.362597751Z" level=info msg="cleaning up dead shim" Dec 13 14:16:02.391316 env[1927]: time="2024-12-13T14:16:02.391219996Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:16:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2836 runtime=io.containerd.runc.v2\n" Dec 13 14:16:02.453965 env[1927]: time="2024-12-13T14:16:02.453878804Z" level=error msg="Failed to destroy network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.454864 env[1927]: time="2024-12-13T14:16:02.454764059Z" level=error msg="encountered an error cleaning up failed sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.455087 env[1927]: time="2024-12-13T14:16:02.454881383Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-z46cn,Uid:4c74b746-886f-4cd3-91c5-2fef3dec6ea3,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.455562 kubelet[2369]: E1213 14:16:02.455513 2369 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:02.455824 kubelet[2369]: E1213 14:16:02.455608 2369 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-z46cn" Dec 13 14:16:02.455824 kubelet[2369]: E1213 14:16:02.455650 2369 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-z46cn" Dec 13 14:16:02.455824 kubelet[2369]: E1213 14:16:02.455757 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-z46cn_default(4c74b746-886f-4cd3-91c5-2fef3dec6ea3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-z46cn_default(4c74b746-886f-4cd3-91c5-2fef3dec6ea3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-z46cn" podUID="4c74b746-886f-4cd3-91c5-2fef3dec6ea3" Dec 13 14:16:02.561846 kubelet[2369]: E1213 14:16:02.561681 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:02.964225 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019-shm.mount: Deactivated successfully. Dec 13 14:16:02.976730 env[1927]: time="2024-12-13T14:16:02.976620766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:16:02.980703 kubelet[2369]: I1213 14:16:02.980660 2369 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:02.984416 env[1927]: time="2024-12-13T14:16:02.983601776Z" level=info msg="StopPodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\"" Dec 13 14:16:02.988314 kubelet[2369]: I1213 14:16:02.988246 2369 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:02.990714 env[1927]: time="2024-12-13T14:16:02.990655981Z" level=info msg="StopPodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\"" Dec 13 14:16:03.067472 env[1927]: time="2024-12-13T14:16:03.067387222Z" level=error msg="StopPodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" failed" error="failed to destroy network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:03.068319 kubelet[2369]: E1213 14:16:03.068042 2369 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:03.068319 kubelet[2369]: E1213 14:16:03.068157 2369 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd"} Dec 13 14:16:03.068319 kubelet[2369]: E1213 14:16:03.068224 2369 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9095e889-31e1-45f0-9e43-c10febbc39bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:03.068850 kubelet[2369]: E1213 14:16:03.068773 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9095e889-31e1-45f0-9e43-c10febbc39bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-645pl" podUID="9095e889-31e1-45f0-9e43-c10febbc39bc" Dec 13 14:16:03.073534 env[1927]: time="2024-12-13T14:16:03.073454150Z" level=error msg="StopPodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" failed" error="failed to destroy network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:03.073943 kubelet[2369]: E1213 14:16:03.073884 2369 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:03.074087 kubelet[2369]: E1213 14:16:03.073976 2369 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019"} Dec 13 14:16:03.074087 kubelet[2369]: E1213 14:16:03.074065 2369 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c74b746-886f-4cd3-91c5-2fef3dec6ea3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:03.074311 kubelet[2369]: E1213 14:16:03.074161 2369 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c74b746-886f-4cd3-91c5-2fef3dec6ea3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-z46cn" podUID="4c74b746-886f-4cd3-91c5-2fef3dec6ea3" Dec 13 14:16:03.562279 kubelet[2369]: E1213 14:16:03.562177 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:04.562663 kubelet[2369]: E1213 14:16:04.562589 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:05.563456 kubelet[2369]: E1213 14:16:05.563382 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:06.563775 kubelet[2369]: E1213 14:16:06.563692 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:07.553281 kubelet[2369]: E1213 14:16:07.553193 2369 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:07.564928 kubelet[2369]: E1213 14:16:07.564866 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:08.565164 kubelet[2369]: E1213 14:16:08.565083 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:09.565854 kubelet[2369]: E1213 14:16:09.565772 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:10.566290 kubelet[2369]: E1213 14:16:10.566181 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:11.567211 kubelet[2369]: E1213 14:16:11.567084 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:12.200600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2705709482.mount: Deactivated successfully. Dec 13 14:16:12.302726 env[1927]: time="2024-12-13T14:16:12.302622597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:12.308457 env[1927]: time="2024-12-13T14:16:12.308381306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:12.313845 env[1927]: time="2024-12-13T14:16:12.313788921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:12.317101 env[1927]: time="2024-12-13T14:16:12.317041499Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:12.319877 env[1927]: time="2024-12-13T14:16:12.318842897Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:16:12.349643 env[1927]: time="2024-12-13T14:16:12.349560886Z" level=info msg="CreateContainer within sandbox \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:16:12.375789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount785208570.mount: Deactivated successfully. Dec 13 14:16:12.388651 env[1927]: time="2024-12-13T14:16:12.388576261Z" level=info msg="CreateContainer within sandbox \"ff203841bdf4e458795bbb45625fb6d941d5f870c3f5b35915ba2a99e065f309\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e\"" Dec 13 14:16:12.389833 env[1927]: time="2024-12-13T14:16:12.389757091Z" level=info msg="StartContainer for \"27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e\"" Dec 13 14:16:12.508915 env[1927]: time="2024-12-13T14:16:12.507213631Z" level=info msg="StartContainer for \"27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e\" returns successfully" Dec 13 14:16:12.568330 kubelet[2369]: E1213 14:16:12.568256 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:12.652079 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:16:12.652301 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:16:13.570434 kubelet[2369]: E1213 14:16:13.570388 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:14.061586 systemd[1]: run-containerd-runc-k8s.io-27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e-runc.YSyiot.mount: Deactivated successfully. Dec 13 14:16:14.138000 audit[3041]: AVC avc: denied { write } for pid=3041 comm="tee" name="fd" dev="proc" ino=15159 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.138000 audit[3041]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb199a11 a2=241 a3=1b6 items=1 ppid=3014 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.150326 kernel: audit: type=1400 audit(1734099374.138:250): avc: denied { write } for pid=3041 comm="tee" name="fd" dev="proc" ino=15159 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.138000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:16:14.170470 kernel: audit: type=1300 audit(1734099374.138:250): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb199a11 a2=241 a3=1b6 items=1 ppid=3014 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.138000 audit: PATH item=0 name="/dev/fd/63" inode=15156 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.186454 kernel: audit: type=1307 audit(1734099374.138:250): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:16:14.186601 kernel: audit: type=1302 audit(1734099374.138:250): item=0 name="/dev/fd/63" inode=15156 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.138000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.195618 kernel: audit: type=1327 audit(1734099374.138:250): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.240000 audit[3060]: AVC avc: denied { write } for pid=3060 comm="tee" name="fd" dev="proc" ino=15204 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.240000 audit[3060]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec230a12 a2=241 a3=1b6 items=1 ppid=3027 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.262733 kernel: audit: type=1400 audit(1734099374.240:251): avc: denied { write } for pid=3060 comm="tee" name="fd" dev="proc" ino=15204 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.262900 kernel: audit: type=1300 audit(1734099374.240:251): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec230a12 a2=241 a3=1b6 items=1 ppid=3027 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.240000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:16:14.276925 kernel: audit: type=1307 audit(1734099374.240:251): cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:16:14.240000 audit: PATH item=0 name="/dev/fd/63" inode=15183 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.287322 kernel: audit: type=1302 audit(1734099374.240:251): item=0 name="/dev/fd/63" inode=15183 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.240000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.300955 kernel: audit: type=1327 audit(1734099374.240:251): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.275000 audit[3073]: AVC avc: denied { write } for pid=3073 comm="tee" name="fd" dev="proc" ino=15210 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.275000 audit[3073]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc827ba22 a2=241 a3=1b6 items=1 ppid=3034 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.275000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:16:14.275000 audit: PATH item=0 name="/dev/fd/63" inode=15199 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.275000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.287000 audit[3076]: AVC avc: denied { write } for pid=3076 comm="tee" name="fd" dev="proc" ino=15219 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.287000 audit[3076]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3978a21 a2=241 a3=1b6 items=1 ppid=3019 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.287000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:16:14.287000 audit: PATH item=0 name="/dev/fd/63" inode=15988 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.287000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.300000 audit[3081]: AVC avc: denied { write } for pid=3081 comm="tee" name="fd" dev="proc" ino=15224 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.300000 audit[3081]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff254da23 a2=241 a3=1b6 items=1 ppid=3020 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.300000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:16:14.300000 audit: PATH item=0 name="/dev/fd/63" inode=15993 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.300000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.330000 audit[3093]: AVC avc: denied { write } for pid=3093 comm="tee" name="fd" dev="proc" ino=15996 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.330000 audit[3093]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb846a21 a2=241 a3=1b6 items=1 ppid=3031 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.330000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:16:14.330000 audit: PATH item=0 name="/dev/fd/63" inode=15221 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.330000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.327000 audit[3089]: AVC avc: denied { write } for pid=3089 comm="tee" name="fd" dev="proc" ino=15232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:16:14.327000 audit[3089]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff46c3a21 a2=241 a3=1b6 items=1 ppid=3033 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.327000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:16:14.327000 audit: PATH item=0 name="/dev/fd/63" inode=15214 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:16:14.327000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:16:14.514000 audit[3107]: NETFILTER_CFG table=filter:69 family=2 entries=9 op=nft_register_rule pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:14.514000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc03f6180 a2=0 a3=1 items=0 ppid=2595 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:14.525000 audit[3107]: NETFILTER_CFG table=nat:70 family=2 entries=27 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:14.525000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc03f6180 a2=0 a3=1 items=0 ppid=2595 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:14.571859 kubelet[2369]: E1213 14:16:14.571790 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.607000 audit: BPF prog-id=10 op=LOAD Dec 13 14:16:14.607000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffea43f7d8 a2=98 a3=ffffea43f7c8 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.607000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.608000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit: BPF prog-id=11 op=LOAD Dec 13 14:16:14.608000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffea43f468 a2=74 a3=95 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.608000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.608000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.608000 audit: BPF prog-id=12 op=LOAD Dec 13 14:16:14.608000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffea43f4c8 a2=94 a3=2 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.608000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.608000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit: BPF prog-id=13 op=LOAD Dec 13 14:16:14.811000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffea43f488 a2=40 a3=ffffea43f4b8 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.811000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:16:14.811000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.811000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffea43f5a0 a2=50 a3=0 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffea43f4f8 a2=28 a3=ffffea43f628 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffea43f528 a2=28 a3=ffffea43f658 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffea43f3d8 a2=28 a3=ffffea43f508 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffea43f548 a2=28 a3=ffffea43f678 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffea43f528 a2=28 a3=ffffea43f658 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffea43f518 a2=28 a3=ffffea43f648 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffea43f548 a2=28 a3=ffffea43f678 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffea43f528 a2=28 a3=ffffea43f658 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffea43f548 a2=28 a3=ffffea43f678 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.827000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.827000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffea43f518 a2=28 a3=ffffea43f648 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffea43f598 a2=28 a3=ffffea43f6d8 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffea43f2d0 a2=50 a3=0 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit: BPF prog-id=14 op=LOAD Dec 13 14:16:14.828000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffea43f2d8 a2=94 a3=5 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.828000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffea43f3e0 a2=50 a3=0 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffea43f528 a2=4 a3=3 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.828000 audit[3120]: AVC avc: denied { confidentiality } for pid=3120 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:14.828000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffea43f508 a2=94 a3=6 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { confidentiality } for pid=3120 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:14.829000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffea43ecd8 a2=94 a3=83 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.829000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.829000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffea43ecd8 a2=94 a3=83 items=0 ppid=3028 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.829000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit: BPF prog-id=15 op=LOAD Dec 13 14:16:14.847000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde557318 a2=98 a3=ffffde557308 items=0 ppid=3028 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.847000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:16:14.847000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.847000 audit: BPF prog-id=16 op=LOAD Dec 13 14:16:14.847000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde5571c8 a2=74 a3=95 items=0 ppid=3028 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.847000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:16:14.849000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:14.849000 audit: BPF prog-id=17 op=LOAD Dec 13 14:16:14.849000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde5571f8 a2=40 a3=ffffde557228 items=0 ppid=3028 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.849000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:16:14.849000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:16:14.969393 (udev-worker)[2955]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:14.974943 systemd-networkd[1596]: vxlan.calico: Link UP Dec 13 14:16:14.975503 systemd-networkd[1596]: vxlan.calico: Gained carrier Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.013000 audit: BPF prog-id=18 op=LOAD Dec 13 14:16:15.013000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc8bcea8 a2=98 a3=ffffdc8bce98 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.013000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit: BPF prog-id=19 op=LOAD Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc8bcb88 a2=74 a3=95 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit: BPF prog-id=20 op=LOAD Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc8bcbe8 a2=94 a3=2 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdc8bcc18 a2=28 a3=ffffdc8bcd48 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc8bcc48 a2=28 a3=ffffdc8bcd78 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc8bcaf8 a2=28 a3=ffffdc8bcc28 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdc8bcc68 a2=28 a3=ffffdc8bcd98 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdc8bcc48 a2=28 a3=ffffdc8bcd78 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdc8bcc38 a2=28 a3=ffffdc8bcd68 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdc8bcc68 a2=28 a3=ffffdc8bcd98 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc8bcc48 a2=28 a3=ffffdc8bcd78 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc8bcc68 a2=28 a3=ffffdc8bcd98 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc8bcc38 a2=28 a3=ffffdc8bcd68 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdc8bccb8 a2=28 a3=ffffdc8bcdf8 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.014000 audit: BPF prog-id=21 op=LOAD Dec 13 14:16:15.014000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc8bcad8 a2=40 a3=ffffdc8bcb08 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.015000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdc8bcb00 a2=50 a3=0 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdc8bcb00 a2=50 a3=0 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.015000 audit: BPF prog-id=22 op=LOAD Dec 13 14:16:15.015000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc8bc268 a2=94 a3=2 items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.016000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.016000 audit: BPF prog-id=23 op=LOAD Dec 13 14:16:15.016000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc8bc3f8 a2=94 a3=2d items=0 ppid=3028 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.021000 audit: BPF prog-id=24 op=LOAD Dec 13 14:16:15.021000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc143efa8 a2=98 a3=ffffc143ef98 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.021000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit: BPF prog-id=25 op=LOAD Dec 13 14:16:15.022000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc143ec38 a2=74 a3=95 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.022000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.022000 audit: BPF prog-id=26 op=LOAD Dec 13 14:16:15.022000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc143ec98 a2=94 a3=2 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.022000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:16:15.017992 (udev-worker)[3161]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit: BPF prog-id=27 op=LOAD Dec 13 14:16:15.202000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc143ec58 a2=40 a3=ffffc143ec88 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.202000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.202000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:16:15.202000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.202000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc143ed70 a2=50 a3=0 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.202000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc143ecc8 a2=28 a3=ffffc143edf8 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc143ecf8 a2=28 a3=ffffc143ee28 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc143eba8 a2=28 a3=ffffc143ecd8 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc143ed18 a2=28 a3=ffffc143ee48 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc143ecf8 a2=28 a3=ffffc143ee28 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc143ece8 a2=28 a3=ffffc143ee18 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc143ed18 a2=28 a3=ffffc143ee48 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc143ecf8 a2=28 a3=ffffc143ee28 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc143ed18 a2=28 a3=ffffc143ee48 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc143ece8 a2=28 a3=ffffc143ee18 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc143ed68 a2=28 a3=ffffc143eea8 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.218000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.218000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc143eaa0 a2=50 a3=0 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit: BPF prog-id=28 op=LOAD Dec 13 14:16:15.219000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc143eaa8 a2=94 a3=5 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.219000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc143ebb0 a2=50 a3=0 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc143ecf8 a2=4 a3=3 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:15.219000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc143ecd8 a2=94 a3=6 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.219000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:15.219000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc143e4a8 a2=94 a3=83 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:16:15.220000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc143e4a8 a2=94 a3=83 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc143fee8 a2=10 a3=ffffc143ffd8 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.220000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.220000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc143fda8 a2=10 a3=ffffc143fe98 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.221000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.221000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc143fd18 a2=10 a3=ffffc143fe98 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.221000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:15.221000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc143fd18 a2=10 a3=ffffc143fe98 items=0 ppid=3028 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:16:15.234000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:16:15.234000 audit[1846]: SYSCALL arch=c00000b7 syscall=79 success=yes exit=0 a0=c a1=ffff9cd6fe70 a2=ffffeffa56e8 a3=1000 items=0 ppid=1 pid=1846 auid=4294967295 uid=195 gid=195 euid=195 suid=195 fsuid=195 egid=195 sgid=195 fsgid=195 tty=(none) ses=4294967295 comm="systemd-timesyn" exe="/usr/lib/systemd/systemd-timesyncd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.234000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-timesyncd" Dec 13 14:16:15.341000 audit[3194]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=3194 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:15.341000 audit[3194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc9f58940 a2=0 a3=ffffbe810fa8 items=0 ppid=3028 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.341000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:15.362000 audit[3196]: NETFILTER_CFG table=nat:72 family=2 entries=15 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:15.362000 audit[3196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffeee05db0 a2=0 a3=ffff908b8fa8 items=0 ppid=3028 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.362000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:15.365000 audit[3195]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:15.365000 audit[3195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd046a620 a2=0 a3=ffffa20cdfa8 items=0 ppid=3028 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.365000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:15.369000 audit[3193]: NETFILTER_CFG table=raw:74 family=2 entries=21 op=nft_register_chain pid=3193 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:15.369000 audit[3193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffb71bf30 a2=0 a3=ffffa71bcfa8 items=0 ppid=3028 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:15.369000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:15.573019 kubelet[2369]: E1213 14:16:15.572907 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:15.896944 env[1927]: time="2024-12-13T14:16:15.896778793Z" level=info msg="StopPodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\"" Dec 13 14:16:15.975073 kubelet[2369]: I1213 14:16:15.971582 2369 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gz6gk" podStartSLOduration=6.365086406 podStartE2EDuration="28.971521362s" podCreationTimestamp="2024-12-13 14:15:47 +0000 UTC" firstStartedPulling="2024-12-13 14:15:49.714403049 +0000 UTC m=+4.134251929" lastFinishedPulling="2024-12-13 14:16:12.320837982 +0000 UTC m=+26.740686885" observedRunningTime="2024-12-13 14:16:13.057009543 +0000 UTC m=+27.476858422" watchObservedRunningTime="2024-12-13 14:16:15.971521362 +0000 UTC m=+30.391370241" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:15.975 [INFO][3217] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:15.976 [INFO][3217] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" iface="eth0" netns="/var/run/netns/cni-4ea3dbc6-08cf-64a8-7f99-407465a1ee0e" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:15.978 [INFO][3217] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" iface="eth0" netns="/var/run/netns/cni-4ea3dbc6-08cf-64a8-7f99-407465a1ee0e" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:15.978 [INFO][3217] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" iface="eth0" netns="/var/run/netns/cni-4ea3dbc6-08cf-64a8-7f99-407465a1ee0e" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:15.978 [INFO][3217] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:15.978 [INFO][3217] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.021 [INFO][3223] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.021 [INFO][3223] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.021 [INFO][3223] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.038 [WARNING][3223] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.038 [INFO][3223] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.040 [INFO][3223] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:16.048471 env[1927]: 2024-12-13 14:16:16.045 [INFO][3217] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:16.058010 env[1927]: time="2024-12-13T14:16:16.048701775Z" level=info msg="TearDown network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" successfully" Dec 13 14:16:16.058010 env[1927]: time="2024-12-13T14:16:16.048763160Z" level=info msg="StopPodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" returns successfully" Dec 13 14:16:16.058010 env[1927]: time="2024-12-13T14:16:16.052827904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-z46cn,Uid:4c74b746-886f-4cd3-91c5-2fef3dec6ea3,Namespace:default,Attempt:1,}" Dec 13 14:16:16.054801 systemd[1]: run-netns-cni\x2d4ea3dbc6\x2d08cf\x2d64a8\x2d7f99\x2d407465a1ee0e.mount: Deactivated successfully. Dec 13 14:16:16.294482 systemd-networkd[1596]: vxlan.calico: Gained IPv6LL Dec 13 14:16:16.314545 (udev-worker)[3170]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:16.316421 systemd-networkd[1596]: cali219133816c7: Link UP Dec 13 14:16:16.322474 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:16:16.322590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali219133816c7: link becomes ready Dec 13 14:16:16.322819 systemd-networkd[1596]: cali219133816c7: Gained carrier Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.168 [INFO][3229] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0 nginx-deployment-6d5f899847- default 4c74b746-886f-4cd3-91c5-2fef3dec6ea3 1018 0 2024-12-13 14:16:01 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.77 nginx-deployment-6d5f899847-z46cn eth0 default [] [] [kns.default ksa.default.default] cali219133816c7 [] []}} ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.168 [INFO][3229] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.229 [INFO][3242] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" HandleID="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.247 [INFO][3242] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" HandleID="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318960), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.77", "pod":"nginx-deployment-6d5f899847-z46cn", "timestamp":"2024-12-13 14:16:16.229238615 +0000 UTC"}, Hostname:"172.31.19.77", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.247 [INFO][3242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.248 [INFO][3242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.248 [INFO][3242] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.77' Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.251 [INFO][3242] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.265 [INFO][3242] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.272 [INFO][3242] ipam/ipam.go 489: Trying affinity for 192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.276 [INFO][3242] ipam/ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.280 [INFO][3242] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.280 [INFO][3242] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.283 [INFO][3242] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.290 [INFO][3242] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.302 [INFO][3242] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.72.65/26] block=192.168.72.64/26 handle="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.302 [INFO][3242] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.65/26] handle="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" host="172.31.19.77" Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.303 [INFO][3242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:16.346148 env[1927]: 2024-12-13 14:16:16.303 [INFO][3242] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.72.65/26] IPv6=[] ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" HandleID="k8s-pod-network.3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.347700 env[1927]: 2024-12-13 14:16:16.306 [INFO][3229] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4c74b746-886f-4cd3-91c5-2fef3dec6ea3", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"", Pod:"nginx-deployment-6d5f899847-z46cn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali219133816c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:16.347700 env[1927]: 2024-12-13 14:16:16.306 [INFO][3229] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.72.65/32] ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.347700 env[1927]: 2024-12-13 14:16:16.306 [INFO][3229] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali219133816c7 ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.347700 env[1927]: 2024-12-13 14:16:16.323 [INFO][3229] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.347700 env[1927]: 2024-12-13 14:16:16.324 [INFO][3229] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4c74b746-886f-4cd3-91c5-2fef3dec6ea3", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d", Pod:"nginx-deployment-6d5f899847-z46cn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali219133816c7", MAC:"d2:59:b4:82:04:52", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:16.347700 env[1927]: 2024-12-13 14:16:16.337 [INFO][3229] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d" Namespace="default" Pod="nginx-deployment-6d5f899847-z46cn" WorkloadEndpoint="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:16.362000 audit[3263]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_chain pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:16.362000 audit[3263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19124 a0=3 a1=ffffe4873670 a2=0 a3=ffff96198fa8 items=0 ppid=3028 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:16.362000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:16.371213 env[1927]: time="2024-12-13T14:16:16.371079251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:16.371488 env[1927]: time="2024-12-13T14:16:16.371158277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:16.371488 env[1927]: time="2024-12-13T14:16:16.371185171Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:16.373082 env[1927]: time="2024-12-13T14:16:16.371758552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d pid=3271 runtime=io.containerd.runc.v2 Dec 13 14:16:16.388648 update_engine[1900]: I1213 14:16:16.382329 1900 update_attempter.cc:509] Updating boot flags... Dec 13 14:16:16.508547 env[1927]: time="2024-12-13T14:16:16.508474329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-z46cn,Uid:4c74b746-886f-4cd3-91c5-2fef3dec6ea3,Namespace:default,Attempt:1,} returns sandbox id \"3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d\"" Dec 13 14:16:16.514547 env[1927]: time="2024-12-13T14:16:16.514476973Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:16:16.573530 kubelet[2369]: E1213 14:16:16.573451 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:16.897440 env[1927]: time="2024-12-13T14:16:16.897245325Z" level=info msg="StopPodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\"" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.007 [INFO][3412] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.007 [INFO][3412] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" iface="eth0" netns="/var/run/netns/cni-455eafed-57b1-61db-9b6a-8b51c11f9984" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.008 [INFO][3412] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" iface="eth0" netns="/var/run/netns/cni-455eafed-57b1-61db-9b6a-8b51c11f9984" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.008 [INFO][3412] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" iface="eth0" netns="/var/run/netns/cni-455eafed-57b1-61db-9b6a-8b51c11f9984" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.008 [INFO][3412] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.008 [INFO][3412] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.062 [INFO][3419] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.063 [INFO][3419] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.063 [INFO][3419] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.075 [WARNING][3419] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.076 [INFO][3419] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.079 [INFO][3419] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:17.083768 env[1927]: 2024-12-13 14:16:17.081 [INFO][3412] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:17.088924 systemd[1]: run-netns-cni\x2d455eafed\x2d57b1\x2d61db\x2d9b6a\x2d8b51c11f9984.mount: Deactivated successfully. Dec 13 14:16:17.090837 env[1927]: time="2024-12-13T14:16:17.090776006Z" level=info msg="TearDown network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" successfully" Dec 13 14:16:17.090988 env[1927]: time="2024-12-13T14:16:17.090950907Z" level=info msg="StopPodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" returns successfully" Dec 13 14:16:17.092126 env[1927]: time="2024-12-13T14:16:17.092072223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-645pl,Uid:9095e889-31e1-45f0-9e43-c10febbc39bc,Namespace:calico-system,Attempt:1,}" Dec 13 14:16:17.361765 systemd-networkd[1596]: cali842a8065efc: Link UP Dec 13 14:16:17.372548 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:16:17.372903 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali842a8065efc: link becomes ready Dec 13 14:16:17.373687 systemd-networkd[1596]: cali842a8065efc: Gained carrier Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.196 [INFO][3426] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.77-k8s-csi--node--driver--645pl-eth0 csi-node-driver- calico-system 9095e889-31e1-45f0-9e43-c10febbc39bc 1029 0 2024-12-13 14:15:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.19.77 csi-node-driver-645pl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali842a8065efc [] []}} ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.197 [INFO][3426] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.257 [INFO][3439] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" HandleID="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.277 [INFO][3439] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" HandleID="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ed330), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.19.77", "pod":"csi-node-driver-645pl", "timestamp":"2024-12-13 14:16:17.257506468 +0000 UTC"}, Hostname:"172.31.19.77", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.277 [INFO][3439] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.277 [INFO][3439] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.277 [INFO][3439] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.77' Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.280 [INFO][3439] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.290 [INFO][3439] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.304 [INFO][3439] ipam/ipam.go 489: Trying affinity for 192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.308 [INFO][3439] ipam/ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.313 [INFO][3439] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.314 [INFO][3439] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.317 [INFO][3439] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3 Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.333 [INFO][3439] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.347 [INFO][3439] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.72.66/26] block=192.168.72.64/26 handle="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.348 [INFO][3439] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.66/26] handle="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" host="172.31.19.77" Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.348 [INFO][3439] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:17.418545 env[1927]: 2024-12-13 14:16:17.348 [INFO][3439] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.72.66/26] IPv6=[] ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" HandleID="k8s-pod-network.cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.419768 env[1927]: 2024-12-13 14:16:17.352 [INFO][3426] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-csi--node--driver--645pl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9095e889-31e1-45f0-9e43-c10febbc39bc", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"", Pod:"csi-node-driver-645pl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali842a8065efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:17.419768 env[1927]: 2024-12-13 14:16:17.352 [INFO][3426] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.72.66/32] ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.419768 env[1927]: 2024-12-13 14:16:17.352 [INFO][3426] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali842a8065efc ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.419768 env[1927]: 2024-12-13 14:16:17.380 [INFO][3426] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.419768 env[1927]: 2024-12-13 14:16:17.381 [INFO][3426] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-csi--node--driver--645pl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9095e889-31e1-45f0-9e43-c10febbc39bc", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3", Pod:"csi-node-driver-645pl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali842a8065efc", MAC:"86:e8:6c:3d:73:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:17.419768 env[1927]: 2024-12-13 14:16:17.399 [INFO][3426] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3" Namespace="calico-system" Pod="csi-node-driver-645pl" WorkloadEndpoint="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:17.424000 audit[3454]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=3454 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:17.424000 audit[3454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffc1765850 a2=0 a3=ffff999ddfa8 items=0 ppid=3028 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:17.424000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:17.461004 env[1927]: time="2024-12-13T14:16:17.460845083Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:17.461004 env[1927]: time="2024-12-13T14:16:17.460933626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:17.461457 env[1927]: time="2024-12-13T14:16:17.461359190Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:17.474937 env[1927]: time="2024-12-13T14:16:17.461975580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3 pid=3466 runtime=io.containerd.runc.v2 Dec 13 14:16:17.574657 kubelet[2369]: E1213 14:16:17.574588 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:17.590750 env[1927]: time="2024-12-13T14:16:17.590692356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-645pl,Uid:9095e889-31e1-45f0-9e43-c10febbc39bc,Namespace:calico-system,Attempt:1,} returns sandbox id \"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3\"" Dec 13 14:16:18.278600 systemd-networkd[1596]: cali219133816c7: Gained IPv6LL Dec 13 14:16:18.575101 kubelet[2369]: E1213 14:16:18.574965 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:18.790787 systemd-networkd[1596]: cali842a8065efc: Gained IPv6LL Dec 13 14:16:19.576052 kubelet[2369]: E1213 14:16:19.575979 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:20.576420 kubelet[2369]: E1213 14:16:20.576349 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:20.899816 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1961998156.mount: Deactivated successfully. Dec 13 14:16:21.576973 kubelet[2369]: E1213 14:16:21.576902 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:22.578135 kubelet[2369]: E1213 14:16:22.578014 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:23.086851 env[1927]: time="2024-12-13T14:16:23.086780464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:23.096750 env[1927]: time="2024-12-13T14:16:23.096679463Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:23.101771 env[1927]: time="2024-12-13T14:16:23.101707519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:23.105212 env[1927]: time="2024-12-13T14:16:23.105144813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:23.107016 env[1927]: time="2024-12-13T14:16:23.106937283Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:16:23.108830 env[1927]: time="2024-12-13T14:16:23.108744297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:16:23.114691 env[1927]: time="2024-12-13T14:16:23.114628229Z" level=info msg="CreateContainer within sandbox \"3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:16:23.139724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2892907709.mount: Deactivated successfully. Dec 13 14:16:23.146356 env[1927]: time="2024-12-13T14:16:23.146295318Z" level=info msg="CreateContainer within sandbox \"3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"053d81d21c66e44ad2f77e63b7b8029cb84404e098aca8ad20f8bd8316ead2ca\"" Dec 13 14:16:23.147372 env[1927]: time="2024-12-13T14:16:23.147295095Z" level=info msg="StartContainer for \"053d81d21c66e44ad2f77e63b7b8029cb84404e098aca8ad20f8bd8316ead2ca\"" Dec 13 14:16:23.255246 env[1927]: time="2024-12-13T14:16:23.255183470Z" level=info msg="StartContainer for \"053d81d21c66e44ad2f77e63b7b8029cb84404e098aca8ad20f8bd8316ead2ca\" returns successfully" Dec 13 14:16:23.579070 kubelet[2369]: E1213 14:16:23.579019 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:24.109325 kubelet[2369]: I1213 14:16:24.109239 2369 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-z46cn" podStartSLOduration=16.515316115 podStartE2EDuration="23.109153952s" podCreationTimestamp="2024-12-13 14:16:01 +0000 UTC" firstStartedPulling="2024-12-13 14:16:16.513670858 +0000 UTC m=+30.933519725" lastFinishedPulling="2024-12-13 14:16:23.107508695 +0000 UTC m=+37.527357562" observedRunningTime="2024-12-13 14:16:24.108817706 +0000 UTC m=+38.528666585" watchObservedRunningTime="2024-12-13 14:16:24.109153952 +0000 UTC m=+38.529002843" Dec 13 14:16:24.579459 kubelet[2369]: E1213 14:16:24.579382 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:24.658713 env[1927]: time="2024-12-13T14:16:24.658654543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:24.662004 env[1927]: time="2024-12-13T14:16:24.661907559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:24.664682 env[1927]: time="2024-12-13T14:16:24.664635859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:24.667566 env[1927]: time="2024-12-13T14:16:24.667520911Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:24.668731 env[1927]: time="2024-12-13T14:16:24.668608566Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:16:24.677301 env[1927]: time="2024-12-13T14:16:24.677205963Z" level=info msg="CreateContainer within sandbox \"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:16:24.705362 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3372257960.mount: Deactivated successfully. Dec 13 14:16:24.717207 env[1927]: time="2024-12-13T14:16:24.717144686Z" level=info msg="CreateContainer within sandbox \"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"147e4d7b608ea102ed4173cbe6eb6fc232d4357251b5a627a1cb0728abcdea12\"" Dec 13 14:16:24.718324 env[1927]: time="2024-12-13T14:16:24.718215312Z" level=info msg="StartContainer for \"147e4d7b608ea102ed4173cbe6eb6fc232d4357251b5a627a1cb0728abcdea12\"" Dec 13 14:16:24.832007 env[1927]: time="2024-12-13T14:16:24.831152950Z" level=info msg="StartContainer for \"147e4d7b608ea102ed4173cbe6eb6fc232d4357251b5a627a1cb0728abcdea12\" returns successfully" Dec 13 14:16:24.834590 env[1927]: time="2024-12-13T14:16:24.834539666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:16:25.581066 kubelet[2369]: E1213 14:16:25.580994 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:26.412589 env[1927]: time="2024-12-13T14:16:26.412508409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:26.416401 env[1927]: time="2024-12-13T14:16:26.416337175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:26.419421 env[1927]: time="2024-12-13T14:16:26.419365057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:26.422130 env[1927]: time="2024-12-13T14:16:26.422082916Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:26.423202 env[1927]: time="2024-12-13T14:16:26.423137385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:16:26.426657 env[1927]: time="2024-12-13T14:16:26.426599965Z" level=info msg="CreateContainer within sandbox \"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:16:26.453571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1797414213.mount: Deactivated successfully. Dec 13 14:16:26.461028 env[1927]: time="2024-12-13T14:16:26.460966959Z" level=info msg="CreateContainer within sandbox \"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1a7845b7865dd7fbe383b61b76607bddffe062a52f050c8225ce48df97e8c7da\"" Dec 13 14:16:26.463120 env[1927]: time="2024-12-13T14:16:26.463026130Z" level=info msg="StartContainer for \"1a7845b7865dd7fbe383b61b76607bddffe062a52f050c8225ce48df97e8c7da\"" Dec 13 14:16:26.527708 systemd[1]: run-containerd-runc-k8s.io-1a7845b7865dd7fbe383b61b76607bddffe062a52f050c8225ce48df97e8c7da-runc.8AKIHP.mount: Deactivated successfully. Dec 13 14:16:26.581562 kubelet[2369]: E1213 14:16:26.581512 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:26.600055 env[1927]: time="2024-12-13T14:16:26.599957190Z" level=info msg="StartContainer for \"1a7845b7865dd7fbe383b61b76607bddffe062a52f050c8225ce48df97e8c7da\" returns successfully" Dec 13 14:16:26.769510 kubelet[2369]: I1213 14:16:26.769336 2369 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:16:26.769510 kubelet[2369]: I1213 14:16:26.769385 2369 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:16:27.142015 amazon-ssm-agent[1904]: 2024-12-13 14:16:27 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:16:27.553164 kubelet[2369]: E1213 14:16:27.552981 2369 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:27.581792 kubelet[2369]: E1213 14:16:27.581698 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:28.436000 audit[3647]: NETFILTER_CFG table=filter:77 family=2 entries=20 op=nft_register_rule pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.440153 kernel: kauditd_printk_skb: 525 callbacks suppressed Dec 13 14:16:28.440237 kernel: audit: type=1325 audit(1734099388.436:356): table=filter:77 family=2 entries=20 op=nft_register_rule pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.436000 audit[3647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe2c05e70 a2=0 a3=1 items=0 ppid=2595 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.456078 kernel: audit: type=1300 audit(1734099388.436:356): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe2c05e70 a2=0 a3=1 items=0 ppid=2595 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.456164 kernel: audit: type=1327 audit(1734099388.436:356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.456000 audit[3647]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.466406 kernel: audit: type=1325 audit(1734099388.456:357): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.466493 kernel: audit: type=1300 audit(1734099388.456:357): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe2c05e70 a2=0 a3=1 items=0 ppid=2595 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.456000 audit[3647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe2c05e70 a2=0 a3=1 items=0 ppid=2595 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.482177 kernel: audit: type=1327 audit(1734099388.456:357): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.494000 audit[3649]: NETFILTER_CFG table=filter:79 family=2 entries=32 op=nft_register_rule pid=3649 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.501289 kernel: audit: type=1325 audit(1734099388.494:358): table=filter:79 family=2 entries=32 op=nft_register_rule pid=3649 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.501396 kernel: audit: type=1300 audit(1734099388.494:358): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe4c97650 a2=0 a3=1 items=0 ppid=2595 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.494000 audit[3649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe4c97650 a2=0 a3=1 items=0 ppid=2595 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.517061 kernel: audit: type=1327 audit(1734099388.494:358): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.517000 audit[3649]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=3649 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.517000 audit[3649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4c97650 a2=0 a3=1 items=0 ppid=2595 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:28.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:28.525205 kubelet[2369]: I1213 14:16:28.525166 2369 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-645pl" podStartSLOduration=32.69499158 podStartE2EDuration="41.525105831s" podCreationTimestamp="2024-12-13 14:15:47 +0000 UTC" firstStartedPulling="2024-12-13 14:16:17.593452371 +0000 UTC m=+32.013301238" lastFinishedPulling="2024-12-13 14:16:26.42356661 +0000 UTC m=+40.843415489" observedRunningTime="2024-12-13 14:16:27.132388798 +0000 UTC m=+41.552237677" watchObservedRunningTime="2024-12-13 14:16:28.525105831 +0000 UTC m=+42.944954710" Dec 13 14:16:28.525422 kernel: audit: type=1325 audit(1734099388.517:359): table=nat:80 family=2 entries=22 op=nft_register_rule pid=3649 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:28.525964 kubelet[2369]: I1213 14:16:28.525926 2369 topology_manager.go:215] "Topology Admit Handler" podUID="46b08130-3b1f-4bc8-ab74-8c8d66dcd32b" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:16:28.582710 kubelet[2369]: E1213 14:16:28.582668 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:28.625468 kubelet[2369]: I1213 14:16:28.625408 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/46b08130-3b1f-4bc8-ab74-8c8d66dcd32b-data\") pod \"nfs-server-provisioner-0\" (UID: \"46b08130-3b1f-4bc8-ab74-8c8d66dcd32b\") " pod="default/nfs-server-provisioner-0" Dec 13 14:16:28.625646 kubelet[2369]: I1213 14:16:28.625494 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r75ts\" (UniqueName: \"kubernetes.io/projected/46b08130-3b1f-4bc8-ab74-8c8d66dcd32b-kube-api-access-r75ts\") pod \"nfs-server-provisioner-0\" (UID: \"46b08130-3b1f-4bc8-ab74-8c8d66dcd32b\") " pod="default/nfs-server-provisioner-0" Dec 13 14:16:28.833075 env[1927]: time="2024-12-13T14:16:28.832951294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:46b08130-3b1f-4bc8-ab74-8c8d66dcd32b,Namespace:default,Attempt:0,}" Dec 13 14:16:29.071867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:16:29.072246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:16:29.068878 systemd-networkd[1596]: cali60e51b789ff: Link UP Dec 13 14:16:29.071951 systemd-networkd[1596]: cali60e51b789ff: Gained carrier Dec 13 14:16:29.072959 (udev-worker)[3671]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:28.937 [INFO][3652] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.77-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 46b08130-3b1f-4bc8-ab74-8c8d66dcd32b 1095 0 2024-12-13 14:16:28 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.19.77 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:28.937 [INFO][3652] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:28.989 [INFO][3664] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" HandleID="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Workload="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.006 [INFO][3664] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" HandleID="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Workload="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004dca0), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.77", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:16:28.988952149 +0000 UTC"}, Hostname:"172.31.19.77", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.007 [INFO][3664] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.007 [INFO][3664] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.007 [INFO][3664] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.77' Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.010 [INFO][3664] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.018 [INFO][3664] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.032 [INFO][3664] ipam/ipam.go 489: Trying affinity for 192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.036 [INFO][3664] ipam/ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.039 [INFO][3664] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.039 [INFO][3664] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.041 [INFO][3664] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.048 [INFO][3664] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.058 [INFO][3664] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.72.67/26] block=192.168.72.64/26 handle="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.058 [INFO][3664] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.67/26] handle="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" host="172.31.19.77" Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.058 [INFO][3664] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:29.098741 env[1927]: 2024-12-13 14:16:29.058 [INFO][3664] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.72.67/26] IPv6=[] ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" HandleID="k8s-pod-network.764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Workload="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.099997 env[1927]: 2024-12-13 14:16:29.061 [INFO][3652] cni-plugin/k8s.go 386: Populated endpoint ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"46b08130-3b1f-4bc8-ab74-8c8d66dcd32b", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.72.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:29.099997 env[1927]: 2024-12-13 14:16:29.061 [INFO][3652] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.72.67/32] ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.099997 env[1927]: 2024-12-13 14:16:29.061 [INFO][3652] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.099997 env[1927]: 2024-12-13 14:16:29.074 [INFO][3652] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.100485 env[1927]: 2024-12-13 14:16:29.074 [INFO][3652] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"46b08130-3b1f-4bc8-ab74-8c8d66dcd32b", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.72.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1e:0c:a2:61:7e:1d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:29.100485 env[1927]: 2024-12-13 14:16:29.090 [INFO][3652] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.77-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:16:29.117000 audit[3682]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:16:29.117000 audit[3682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffe7537880 a2=0 a3=ffff94db7fa8 items=0 ppid=3028 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:29.117000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:16:29.135688 env[1927]: time="2024-12-13T14:16:29.135545453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:29.135970 env[1927]: time="2024-12-13T14:16:29.135909273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:29.136141 env[1927]: time="2024-12-13T14:16:29.136085753Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:29.136635 env[1927]: time="2024-12-13T14:16:29.136555489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f pid=3695 runtime=io.containerd.runc.v2 Dec 13 14:16:29.247681 env[1927]: time="2024-12-13T14:16:29.247625120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:46b08130-3b1f-4bc8-ab74-8c8d66dcd32b,Namespace:default,Attempt:0,} returns sandbox id \"764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f\"" Dec 13 14:16:29.250967 env[1927]: time="2024-12-13T14:16:29.250916997Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:16:29.584419 kubelet[2369]: E1213 14:16:29.584339 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:30.503435 systemd-networkd[1596]: cali60e51b789ff: Gained IPv6LL Dec 13 14:16:30.585087 kubelet[2369]: E1213 14:16:30.585010 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:31.585308 kubelet[2369]: E1213 14:16:31.585183 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:32.585748 kubelet[2369]: E1213 14:16:32.585675 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:32.861505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3755368606.mount: Deactivated successfully. Dec 13 14:16:32.886000 audit[3731]: NETFILTER_CFG table=filter:82 family=2 entries=32 op=nft_register_rule pid=3731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:32.886000 audit[3731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffad8bb00 a2=0 a3=1 items=0 ppid=2595 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:32.892000 audit[3731]: NETFILTER_CFG table=nat:83 family=2 entries=34 op=nft_register_chain pid=3731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:32.892000 audit[3731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffad8bb00 a2=0 a3=1 items=0 ppid=2595 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:33.586706 kubelet[2369]: E1213 14:16:33.586616 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:34.587083 kubelet[2369]: E1213 14:16:34.587012 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:35.588023 kubelet[2369]: E1213 14:16:35.587946 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:36.588434 kubelet[2369]: E1213 14:16:36.588393 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:36.605799 env[1927]: time="2024-12-13T14:16:36.605731874Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:36.608916 env[1927]: time="2024-12-13T14:16:36.608842946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:36.613014 env[1927]: time="2024-12-13T14:16:36.612924898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:36.617228 env[1927]: time="2024-12-13T14:16:36.617137703Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:36.619075 env[1927]: time="2024-12-13T14:16:36.619013464Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 14:16:36.630777 env[1927]: time="2024-12-13T14:16:36.630708791Z" level=info msg="CreateContainer within sandbox \"764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:16:36.655060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2397268778.mount: Deactivated successfully. Dec 13 14:16:36.668917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1304654082.mount: Deactivated successfully. Dec 13 14:16:36.677982 env[1927]: time="2024-12-13T14:16:36.677916485Z" level=info msg="CreateContainer within sandbox \"764d99941d02bbca4ed9c8634583e4766b880eb09cb55fd090d289fd05b8a44f\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"78abd8934748c1c60e71e2debb5e7b7d953ae1dbdac8731aea61ff3d07540d58\"" Dec 13 14:16:36.679074 env[1927]: time="2024-12-13T14:16:36.679016191Z" level=info msg="StartContainer for \"78abd8934748c1c60e71e2debb5e7b7d953ae1dbdac8731aea61ff3d07540d58\"" Dec 13 14:16:36.791311 env[1927]: time="2024-12-13T14:16:36.787860035Z" level=info msg="StartContainer for \"78abd8934748c1c60e71e2debb5e7b7d953ae1dbdac8731aea61ff3d07540d58\" returns successfully" Dec 13 14:16:37.189427 kubelet[2369]: I1213 14:16:37.189322 2369 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.819819006 podStartE2EDuration="9.18922553s" podCreationTimestamp="2024-12-13 14:16:28 +0000 UTC" firstStartedPulling="2024-12-13 14:16:29.250234118 +0000 UTC m=+43.670082985" lastFinishedPulling="2024-12-13 14:16:36.619640642 +0000 UTC m=+51.039489509" observedRunningTime="2024-12-13 14:16:37.188937736 +0000 UTC m=+51.608786615" watchObservedRunningTime="2024-12-13 14:16:37.18922553 +0000 UTC m=+51.609074409" Dec 13 14:16:37.207000 audit[3788]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:37.210807 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 14:16:37.210909 kernel: audit: type=1325 audit(1734099397.207:363): table=filter:84 family=2 entries=20 op=nft_register_rule pid=3788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:37.207000 audit[3788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff43d2920 a2=0 a3=1 items=0 ppid=2595 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.226965 kernel: audit: type=1300 audit(1734099397.207:363): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff43d2920 a2=0 a3=1 items=0 ppid=2595 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.227120 kernel: audit: type=1327 audit(1734099397.207:363): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:37.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:37.215000 audit[3788]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=3788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:37.237536 kernel: audit: type=1325 audit(1734099397.215:364): table=nat:85 family=2 entries=106 op=nft_register_chain pid=3788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:37.237656 kernel: audit: type=1300 audit(1734099397.215:364): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff43d2920 a2=0 a3=1 items=0 ppid=2595 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.215000 audit[3788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff43d2920 a2=0 a3=1 items=0 ppid=2595 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:37.253392 kernel: audit: type=1327 audit(1734099397.215:364): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:37.589939 kubelet[2369]: E1213 14:16:37.589875 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:38.590414 kubelet[2369]: E1213 14:16:38.590367 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:39.592404 kubelet[2369]: E1213 14:16:39.592326 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:40.379382 systemd[1]: run-containerd-runc-k8s.io-27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e-runc.ABsPFc.mount: Deactivated successfully. Dec 13 14:16:40.594090 kubelet[2369]: E1213 14:16:40.594036 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:41.595288 kubelet[2369]: E1213 14:16:41.595195 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:42.595428 kubelet[2369]: E1213 14:16:42.595359 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:43.596413 kubelet[2369]: E1213 14:16:43.596366 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:44.597401 kubelet[2369]: E1213 14:16:44.597334 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:45.598323 kubelet[2369]: E1213 14:16:45.598253 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:46.599967 kubelet[2369]: E1213 14:16:46.599922 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:47.553234 kubelet[2369]: E1213 14:16:47.553164 2369 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:47.601289 kubelet[2369]: E1213 14:16:47.601225 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:47.609470 env[1927]: time="2024-12-13T14:16:47.609367893Z" level=info msg="StopPodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\"" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.675 [WARNING][3841] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4c74b746-886f-4cd3-91c5-2fef3dec6ea3", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d", Pod:"nginx-deployment-6d5f899847-z46cn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali219133816c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.675 [INFO][3841] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.675 [INFO][3841] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" iface="eth0" netns="" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.675 [INFO][3841] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.675 [INFO][3841] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.729 [INFO][3847] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.730 [INFO][3847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.730 [INFO][3847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.744 [WARNING][3847] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.744 [INFO][3847] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.747 [INFO][3847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:47.751880 env[1927]: 2024-12-13 14:16:47.749 [INFO][3841] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.752816 env[1927]: time="2024-12-13T14:16:47.751928863Z" level=info msg="TearDown network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" successfully" Dec 13 14:16:47.752816 env[1927]: time="2024-12-13T14:16:47.751975592Z" level=info msg="StopPodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" returns successfully" Dec 13 14:16:47.753704 env[1927]: time="2024-12-13T14:16:47.753638031Z" level=info msg="RemovePodSandbox for \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\"" Dec 13 14:16:47.753856 env[1927]: time="2024-12-13T14:16:47.753696833Z" level=info msg="Forcibly stopping sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\"" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.818 [WARNING][3865] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4c74b746-886f-4cd3-91c5-2fef3dec6ea3", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"3d326d6a305eb64db261fa90886c9d1c459ecab2e5edbb08edf226d4c90f7a6d", Pod:"nginx-deployment-6d5f899847-z46cn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali219133816c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.819 [INFO][3865] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.819 [INFO][3865] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" iface="eth0" netns="" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.819 [INFO][3865] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.819 [INFO][3865] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.857 [INFO][3871] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.857 [INFO][3871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.857 [INFO][3871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.869 [WARNING][3871] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.869 [INFO][3871] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" HandleID="k8s-pod-network.0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Workload="172.31.19.77-k8s-nginx--deployment--6d5f899847--z46cn-eth0" Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.872 [INFO][3871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:47.876542 env[1927]: 2024-12-13 14:16:47.874 [INFO][3865] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019" Dec 13 14:16:47.877461 env[1927]: time="2024-12-13T14:16:47.876604113Z" level=info msg="TearDown network for sandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" successfully" Dec 13 14:16:47.880901 env[1927]: time="2024-12-13T14:16:47.880829831Z" level=info msg="RemovePodSandbox \"0a6e0014974ae6a54b8849aa66fd9ad6aba8025fe3e68d0cd33b38d48eab2019\" returns successfully" Dec 13 14:16:47.881767 env[1927]: time="2024-12-13T14:16:47.881692041Z" level=info msg="StopPodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\"" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:47.968 [WARNING][3890] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-csi--node--driver--645pl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9095e889-31e1-45f0-9e43-c10febbc39bc", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3", Pod:"csi-node-driver-645pl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali842a8065efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:47.969 [INFO][3890] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:47.969 [INFO][3890] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" iface="eth0" netns="" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:47.969 [INFO][3890] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:47.969 [INFO][3890] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.013 [INFO][3898] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.014 [INFO][3898] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.014 [INFO][3898] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.026 [WARNING][3898] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.026 [INFO][3898] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.028 [INFO][3898] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:48.033383 env[1927]: 2024-12-13 14:16:48.030 [INFO][3890] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.034590 env[1927]: time="2024-12-13T14:16:48.033428204Z" level=info msg="TearDown network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" successfully" Dec 13 14:16:48.034590 env[1927]: time="2024-12-13T14:16:48.033485361Z" level=info msg="StopPodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" returns successfully" Dec 13 14:16:48.034590 env[1927]: time="2024-12-13T14:16:48.034350283Z" level=info msg="RemovePodSandbox for \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\"" Dec 13 14:16:48.034590 env[1927]: time="2024-12-13T14:16:48.034399989Z" level=info msg="Forcibly stopping sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\"" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.110 [WARNING][3919] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-csi--node--driver--645pl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9095e889-31e1-45f0-9e43-c10febbc39bc", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"cb66bd8e0f06cc158147f626195134c2dccd8aaa61dd8c80e8cc282173202ad3", Pod:"csi-node-driver-645pl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.72.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali842a8065efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.110 [INFO][3919] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.110 [INFO][3919] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" iface="eth0" netns="" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.110 [INFO][3919] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.110 [INFO][3919] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.152 [INFO][3925] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.152 [INFO][3925] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.152 [INFO][3925] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.167 [WARNING][3925] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.167 [INFO][3925] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" HandleID="k8s-pod-network.924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Workload="172.31.19.77-k8s-csi--node--driver--645pl-eth0" Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.173 [INFO][3925] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:16:48.180104 env[1927]: 2024-12-13 14:16:48.175 [INFO][3919] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd" Dec 13 14:16:48.180104 env[1927]: time="2024-12-13T14:16:48.178403394Z" level=info msg="TearDown network for sandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" successfully" Dec 13 14:16:48.183582 env[1927]: time="2024-12-13T14:16:48.183460742Z" level=info msg="RemovePodSandbox \"924de88cbb2d9e58308ea5594834c14d2b9ffe6c0b86879de79d5650157640dd\" returns successfully" Dec 13 14:16:48.602705 kubelet[2369]: E1213 14:16:48.602607 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:49.603480 kubelet[2369]: E1213 14:16:49.603400 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:50.604085 kubelet[2369]: E1213 14:16:50.604010 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:51.604837 kubelet[2369]: E1213 14:16:51.604738 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:52.605438 kubelet[2369]: E1213 14:16:52.605353 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:53.606620 kubelet[2369]: E1213 14:16:53.606553 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:54.607722 kubelet[2369]: E1213 14:16:54.607674 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:55.609500 kubelet[2369]: E1213 14:16:55.609397 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:56.609688 kubelet[2369]: E1213 14:16:56.609636 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:57.611544 kubelet[2369]: E1213 14:16:57.611421 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:58.612403 kubelet[2369]: E1213 14:16:58.612356 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:16:59.613733 kubelet[2369]: E1213 14:16:59.613665 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:00.614611 kubelet[2369]: E1213 14:17:00.614561 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:01.615860 kubelet[2369]: E1213 14:17:01.615793 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:01.632379 kubelet[2369]: I1213 14:17:01.632300 2369 topology_manager.go:215] "Topology Admit Handler" podUID="a4ffe270-417c-4f7b-8dab-559fd3581e98" podNamespace="default" podName="test-pod-1" Dec 13 14:17:01.816169 kubelet[2369]: I1213 14:17:01.816118 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5222bf7f-a99b-44ff-80ce-5ccb67db74d3\" (UniqueName: \"kubernetes.io/nfs/a4ffe270-417c-4f7b-8dab-559fd3581e98-pvc-5222bf7f-a99b-44ff-80ce-5ccb67db74d3\") pod \"test-pod-1\" (UID: \"a4ffe270-417c-4f7b-8dab-559fd3581e98\") " pod="default/test-pod-1" Dec 13 14:17:01.816605 kubelet[2369]: I1213 14:17:01.816561 2369 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qvmfm\" (UniqueName: \"kubernetes.io/projected/a4ffe270-417c-4f7b-8dab-559fd3581e98-kube-api-access-qvmfm\") pod \"test-pod-1\" (UID: \"a4ffe270-417c-4f7b-8dab-559fd3581e98\") " pod="default/test-pod-1" Dec 13 14:17:01.950000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.961490 kernel: audit: type=1400 audit(1734099421.950:365): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.961655 kernel: Failed to create system directory netfs Dec 13 14:17:01.963451 kernel: Failed to create system directory netfs Dec 13 14:17:01.963527 kernel: audit: type=1400 audit(1734099421.950:365): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.950000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.972584 kernel: Failed to create system directory netfs Dec 13 14:17:01.972703 kernel: audit: type=1400 audit(1734099421.950:365): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.950000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.981925 kernel: Failed to create system directory netfs Dec 13 14:17:01.982029 kernel: audit: type=1400 audit(1734099421.950:365): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.950000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.995314 kernel: audit: type=1300 audit(1734099421.950:365): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae3b5d5e0 a1=12c14 a2=aaaada1be028 a3=aaaae3b4e010 items=0 ppid=1726 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:01.950000 audit[3945]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae3b5d5e0 a1=12c14 a2=aaaada1be028 a3=aaaae3b4e010 items=0 ppid=1726 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:02.009045 kernel: Failed to create system directory fscache Dec 13 14:17:02.009193 kernel: audit: type=1327 audit(1734099421.950:365): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:17:01.950000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:17:02.014465 kernel: Failed to create system directory fscache Dec 13 14:17:02.014708 kernel: audit: type=1400 audit(1734099421.998:366): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.023803 kernel: Failed to create system directory fscache Dec 13 14:17:02.023967 kernel: audit: type=1400 audit(1734099421.998:366): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.033039 kernel: Failed to create system directory fscache Dec 13 14:17:02.033183 kernel: audit: type=1400 audit(1734099421.998:366): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.049691 kernel: Failed to create system directory fscache Dec 13 14:17:02.049856 kernel: audit: type=1400 audit(1734099421.998:366): avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.051980 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.054059 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.054297 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.056301 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.061955 kernel: Failed to create system directory fscache Dec 13 14:17:02.062035 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.063952 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.065888 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.067795 kernel: Failed to create system directory fscache Dec 13 14:17:01.998000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:01.998000 audit[3945]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae3d70210 a1=4c344 a2=aaaada1be028 a3=aaaae3b4e010 items=0 ppid=1726 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:02.070354 kernel: FS-Cache: Loaded Dec 13 14:17:01.998000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.110034 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.110102 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.113797 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.113882 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.115740 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.117632 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.119621 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.121532 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.123513 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.125409 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.127324 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.129234 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.131134 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.132998 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.134883 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.136771 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.138752 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.140769 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.142684 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.144568 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.146444 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.148339 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.150217 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.152084 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.153968 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.155890 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.157779 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.159713 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.161666 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.163618 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.165511 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.167386 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.169279 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.171237 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.173149 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.175183 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.177042 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.178986 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.180896 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.182780 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.184734 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.186675 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.188618 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.190486 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.192367 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.194227 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.196094 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.198012 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.199897 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.201766 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.203670 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.205533 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.207396 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.209277 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.211146 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.213024 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.217049 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.217406 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.221039 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.221199 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.224702 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.224779 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.228544 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.228717 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.232512 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.235515 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.236328 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.239764 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.240058 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.244013 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.244409 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.247915 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.248089 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.251710 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.251964 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.253780 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.257438 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.257645 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.260994 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.261172 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.263066 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.266629 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.266778 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.270062 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.270209 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.273574 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.273760 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.277142 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.277348 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.280726 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.280870 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.284384 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.284528 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.287886 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.288024 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.291340 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.291483 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.294868 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.295035 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.296625 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.298430 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.301801 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.301932 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.305207 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.305362 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.308765 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.308895 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.312021 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.312117 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.315430 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.315519 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.318712 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.318769 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.320346 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.323668 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.323747 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.325374 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.327213 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.328704 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.332255 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.332710 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.335825 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.335937 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.339389 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.339511 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.098000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.342756 kernel: Failed to create system directory sunrpc Dec 13 14:17:02.355162 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:17:02.355701 kernel: RPC: Registered udp transport module. Dec 13 14:17:02.355791 kernel: RPC: Registered tcp transport module. Dec 13 14:17:02.359440 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:17:02.098000 audit[3945]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae3dbc560 a1=14a504 a2=aaaada1be028 a3=aaaae3b4e010 items=6 ppid=1726 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:02.098000 audit: CWD cwd="/" Dec 13 14:17:02.098000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:02.098000 audit: PATH item=1 name=(null) inode=19388 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:02.098000 audit: PATH item=2 name=(null) inode=19388 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:02.098000 audit: PATH item=3 name=(null) inode=19389 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:02.098000 audit: PATH item=4 name=(null) inode=19388 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:02.098000 audit: PATH item=5 name=(null) inode=19390 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:02.098000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.414347 kernel: Failed to create system directory nfs Dec 13 14:17:02.414567 kernel: Failed to create system directory nfs Dec 13 14:17:02.414694 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.417864 kernel: Failed to create system directory nfs Dec 13 14:17:02.418062 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.421154 kernel: Failed to create system directory nfs Dec 13 14:17:02.421339 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.424733 kernel: Failed to create system directory nfs Dec 13 14:17:02.425021 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.428525 kernel: Failed to create system directory nfs Dec 13 14:17:02.428854 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.430439 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.434024 kernel: Failed to create system directory nfs Dec 13 14:17:02.434421 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.437238 kernel: Failed to create system directory nfs Dec 13 14:17:02.437428 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.440949 kernel: Failed to create system directory nfs Dec 13 14:17:02.441234 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.444063 kernel: Failed to create system directory nfs Dec 13 14:17:02.444248 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.447693 kernel: Failed to create system directory nfs Dec 13 14:17:02.448164 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.449778 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.452975 kernel: Failed to create system directory nfs Dec 13 14:17:02.453274 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.454867 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.458219 kernel: Failed to create system directory nfs Dec 13 14:17:02.458348 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.461709 kernel: Failed to create system directory nfs Dec 13 14:17:02.461890 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.471726 kernel: Failed to create system directory nfs Dec 13 14:17:02.471895 kernel: Failed to create system directory nfs Dec 13 14:17:02.471972 kernel: Failed to create system directory nfs Dec 13 14:17:02.472088 kernel: Failed to create system directory nfs Dec 13 14:17:02.472186 kernel: Failed to create system directory nfs Dec 13 14:17:02.472341 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.473520 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.477216 kernel: Failed to create system directory nfs Dec 13 14:17:02.477575 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.480452 kernel: Failed to create system directory nfs Dec 13 14:17:02.480643 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.483973 kernel: Failed to create system directory nfs Dec 13 14:17:02.484231 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.486131 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.489556 kernel: Failed to create system directory nfs Dec 13 14:17:02.489806 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.492939 kernel: Failed to create system directory nfs Dec 13 14:17:02.493101 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.496379 kernel: Failed to create system directory nfs Dec 13 14:17:02.496543 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.499804 kernel: Failed to create system directory nfs Dec 13 14:17:02.499944 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.501682 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.505143 kernel: Failed to create system directory nfs Dec 13 14:17:02.505334 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.510257 kernel: Failed to create system directory nfs Dec 13 14:17:02.510450 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.513630 kernel: Failed to create system directory nfs Dec 13 14:17:02.513800 kernel: Failed to create system directory nfs Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.404000 audit[3945]: AVC avc: denied { confidentiality } for pid=3945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.517149 kernel: Failed to create system directory nfs Dec 13 14:17:02.551517 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:17:02.404000 audit[3945]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae3f656f0 a1=116204 a2=aaaada1be028 a3=aaaae3b4e010 items=0 ppid=1726 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:02.404000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.609558 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.609742 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.609800 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.612895 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.613070 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.616343 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.616487 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.616621 kubelet[2369]: E1213 14:17:02.616126 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.619776 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.619891 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.621336 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.624722 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.624875 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.628066 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.628209 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.631363 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.631505 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.634852 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.635064 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.638311 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.638519 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.641726 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.642001 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.645322 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.645455 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.648798 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.648931 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.652251 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.652432 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.655710 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.655894 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.659081 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.659209 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.662456 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.662635 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.665898 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.666001 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.669312 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.669371 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.672544 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.672655 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.675806 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.675860 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.677333 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.678968 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.680520 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.682162 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.685524 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.685579 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.688737 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.688832 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.690311 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.693575 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.693628 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.696794 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.696844 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.699980 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.700028 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.703195 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.703251 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.704799 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.706491 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.709705 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.709757 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.712981 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.713032 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.716150 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.716239 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.719414 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.719467 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.722621 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.722776 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.730892 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.730985 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.731028 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.731068 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.731107 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.733974 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.734129 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.735731 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.737237 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.738954 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.742127 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.742215 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.745433 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.745623 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.749011 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.749305 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.752523 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.752710 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.754345 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.757613 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.757670 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.760864 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.760957 kernel: Failed to create system directory nfs4 Dec 13 14:17:02.595000 audit[3950]: AVC avc: denied { confidentiality } for pid=3950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.966057 kernel: NFS: Registering the id_resolver key type Dec 13 14:17:02.966230 kernel: Key type id_resolver registered Dec 13 14:17:02.966309 kernel: Key type id_legacy registered Dec 13 14:17:02.595000 audit[3950]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb388a010 a1=19c49c a2=aaaace74e028 a3=aaab02447010 items=0 ppid=1726 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:02.595000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.987798 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.987898 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.988042 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.989319 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.991067 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.994384 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.994468 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.997690 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.997771 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.001017 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.001094 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.004404 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.004498 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.006033 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.011454 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.011597 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.011644 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.014591 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.014645 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.018010 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.018103 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.021412 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.021520 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.024845 kernel: Failed to create system directory rpcgss Dec 13 14:17:03.024988 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:02.981000 audit[3951]: AVC avc: denied { confidentiality } for pid=3951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:03.028151 kernel: Failed to create system directory rpcgss Dec 13 14:17:02.981000 audit[3951]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff98752010 a1=5ee04 a2=aaaae74de028 a3=aaab1a3b9010 items=0 ppid=1726 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:02.981000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:17:03.058079 nfsidmap[3960]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:17:03.064496 nfsidmap[3961]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:17:03.080000 audit[2146]: AVC avc: denied { watch_reads } for pid=2146 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:17:03.080000 audit[2146]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=aaaae41f87b0 a2=10 a3=0 items=0 ppid=1 pid=2146 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:03.080000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:17:03.080000 audit[2146]: AVC avc: denied { watch_reads } for pid=2146 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:17:03.080000 audit[2146]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=aaaae41f87b0 a2=10 a3=0 items=0 ppid=1 pid=2146 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:03.080000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:17:03.080000 audit[2146]: AVC avc: denied { watch_reads } for pid=2146 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:17:03.080000 audit[2146]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=aaaae41f87b0 a2=10 a3=0 items=0 ppid=1 pid=2146 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:03.080000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:17:03.081000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:17:03.082000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:17:03.082000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:17:03.142464 env[1927]: time="2024-12-13T14:17:03.141712309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a4ffe270-417c-4f7b-8dab-559fd3581e98,Namespace:default,Attempt:0,}" Dec 13 14:17:03.361556 (udev-worker)[3952]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:03.369071 systemd-networkd[1596]: cali5ec59c6bf6e: Link UP Dec 13 14:17:03.377778 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:03.377919 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:17:03.380114 systemd-networkd[1596]: cali5ec59c6bf6e: Gained carrier Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.234 [INFO][3962] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.77-k8s-test--pod--1-eth0 default a4ffe270-417c-4f7b-8dab-559fd3581e98 1223 0 2024-12-13 14:16:29 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.77 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.234 [INFO][3962] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.288 [INFO][3974] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" HandleID="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Workload="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.307 [INFO][3974] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" HandleID="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Workload="172.31.19.77-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002914f0), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.77", "pod":"test-pod-1", "timestamp":"2024-12-13 14:17:03.288807246 +0000 UTC"}, Hostname:"172.31.19.77", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.307 [INFO][3974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.307 [INFO][3974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.307 [INFO][3974] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.77' Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.310 [INFO][3974] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.316 [INFO][3974] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.324 [INFO][3974] ipam/ipam.go 489: Trying affinity for 192.168.72.64/26 host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.327 [INFO][3974] ipam/ipam.go 155: Attempting to load block cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.331 [INFO][3974] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.72.64/26 host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.331 [INFO][3974] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.72.64/26 handle="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.333 [INFO][3974] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88 Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.345 [INFO][3974] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.72.64/26 handle="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.355 [INFO][3974] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.72.68/26] block=192.168.72.64/26 handle="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.355 [INFO][3974] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.72.68/26] handle="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" host="172.31.19.77" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.355 [INFO][3974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.355 [INFO][3974] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.72.68/26] IPv6=[] ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" HandleID="k8s-pod-network.48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Workload="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.407690 env[1927]: 2024-12-13 14:17:03.358 [INFO][3962] cni-plugin/k8s.go 386: Populated endpoint ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a4ffe270-417c-4f7b-8dab-559fd3581e98", ResourceVersion:"1223", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:03.409478 env[1927]: 2024-12-13 14:17:03.358 [INFO][3962] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.72.68/32] ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.409478 env[1927]: 2024-12-13 14:17:03.358 [INFO][3962] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.409478 env[1927]: 2024-12-13 14:17:03.378 [INFO][3962] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.409478 env[1927]: 2024-12-13 14:17:03.378 [INFO][3962] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.77-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a4ffe270-417c-4f7b-8dab-559fd3581e98", ResourceVersion:"1223", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.77", ContainerID:"48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.72.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f2:3d:aa:a2:3d:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:03.409478 env[1927]: 2024-12-13 14:17:03.405 [INFO][3962] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.77-k8s-test--pod--1-eth0" Dec 13 14:17:03.433939 env[1927]: time="2024-12-13T14:17:03.433763019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:03.433939 env[1927]: time="2024-12-13T14:17:03.433875510Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:03.434409 env[1927]: time="2024-12-13T14:17:03.433904850Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:03.434773 env[1927]: time="2024-12-13T14:17:03.434701403Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88 pid=3999 runtime=io.containerd.runc.v2 Dec 13 14:17:03.528000 audit[4027]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:03.528000 audit[4027]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffd0609920 a2=0 a3=ffff9fb05fa8 items=0 ppid=3028 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:03.528000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:03.546119 env[1927]: time="2024-12-13T14:17:03.546057348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a4ffe270-417c-4f7b-8dab-559fd3581e98,Namespace:default,Attempt:0,} returns sandbox id \"48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88\"" Dec 13 14:17:03.549583 env[1927]: time="2024-12-13T14:17:03.549526620Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:17:03.617114 kubelet[2369]: E1213 14:17:03.616366 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:04.009546 env[1927]: time="2024-12-13T14:17:04.009400365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:04.011683 env[1927]: time="2024-12-13T14:17:04.011622967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:04.015601 env[1927]: time="2024-12-13T14:17:04.015539919Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:04.018926 env[1927]: time="2024-12-13T14:17:04.018877883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:04.020256 env[1927]: time="2024-12-13T14:17:04.020212490Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:17:04.024048 env[1927]: time="2024-12-13T14:17:04.023988307Z" level=info msg="CreateContainer within sandbox \"48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:17:04.053458 env[1927]: time="2024-12-13T14:17:04.053392903Z" level=info msg="CreateContainer within sandbox \"48b4d20a4c69d7b810f5a04c42eca54fbca2ebbde52a51c9b5aea0c40aa58b88\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9eb55b9bf3cebb6259326b8eee3e65cd7278addd7b00f661825647ad073c582d\"" Dec 13 14:17:04.054908 env[1927]: time="2024-12-13T14:17:04.054858697Z" level=info msg="StartContainer for \"9eb55b9bf3cebb6259326b8eee3e65cd7278addd7b00f661825647ad073c582d\"" Dec 13 14:17:04.171801 env[1927]: time="2024-12-13T14:17:04.171747659Z" level=info msg="StartContainer for \"9eb55b9bf3cebb6259326b8eee3e65cd7278addd7b00f661825647ad073c582d\" returns successfully" Dec 13 14:17:04.617370 kubelet[2369]: E1213 14:17:04.617306 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:05.446762 systemd-networkd[1596]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:17:05.618504 kubelet[2369]: E1213 14:17:05.618422 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:06.620067 kubelet[2369]: E1213 14:17:06.620014 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:07.552732 kubelet[2369]: E1213 14:17:07.552668 2369 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:07.621327 kubelet[2369]: E1213 14:17:07.621255 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:08.623177 kubelet[2369]: E1213 14:17:08.623088 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:09.624059 kubelet[2369]: E1213 14:17:09.623967 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:10.376306 systemd[1]: run-containerd-runc-k8s.io-27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e-runc.3SWR2y.mount: Deactivated successfully. Dec 13 14:17:10.624554 kubelet[2369]: E1213 14:17:10.624478 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:11.624911 kubelet[2369]: E1213 14:17:11.624785 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:12.626155 kubelet[2369]: E1213 14:17:12.626089 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:13.627980 kubelet[2369]: E1213 14:17:13.627898 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:14.629304 kubelet[2369]: E1213 14:17:14.629188 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:15.630767 kubelet[2369]: E1213 14:17:15.630715 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:16.632005 kubelet[2369]: E1213 14:17:16.631910 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:17.632821 kubelet[2369]: E1213 14:17:17.632771 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:18.634758 kubelet[2369]: E1213 14:17:18.634629 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:19.057769 amazon-ssm-agent[1904]: 2024-12-13 14:17:19 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:17:19.635077 kubelet[2369]: E1213 14:17:19.635011 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:20.635715 kubelet[2369]: E1213 14:17:20.635625 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:21.637125 kubelet[2369]: E1213 14:17:21.637017 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:22.637826 kubelet[2369]: E1213 14:17:22.637763 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:23.638785 kubelet[2369]: E1213 14:17:23.638717 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:24.639763 kubelet[2369]: E1213 14:17:24.639687 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:25.641416 kubelet[2369]: E1213 14:17:25.641372 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:26.642994 kubelet[2369]: E1213 14:17:26.642944 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:27.552613 kubelet[2369]: E1213 14:17:27.552569 2369 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:27.644290 kubelet[2369]: E1213 14:17:27.644230 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:28.644784 kubelet[2369]: E1213 14:17:28.644707 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:29.645809 kubelet[2369]: E1213 14:17:29.645695 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:29.762569 kubelet[2369]: E1213 14:17:29.762502 2369 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:30.647530 kubelet[2369]: E1213 14:17:30.647455 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:31.647791 kubelet[2369]: E1213 14:17:31.647744 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:32.648834 kubelet[2369]: E1213 14:17:32.648757 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:33.649706 kubelet[2369]: E1213 14:17:33.649608 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:34.650624 kubelet[2369]: E1213 14:17:34.650548 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:35.651810 kubelet[2369]: E1213 14:17:35.651768 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:36.653003 kubelet[2369]: E1213 14:17:36.652936 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:37.653177 kubelet[2369]: E1213 14:17:37.653131 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:38.654857 kubelet[2369]: E1213 14:17:38.654810 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:39.656759 kubelet[2369]: E1213 14:17:39.656667 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:39.763820 kubelet[2369]: E1213 14:17:39.763703 2369 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:40.374968 systemd[1]: run-containerd-runc-k8s.io-27fa61e4e23b2631db6c304b046148361bf27be95929eb745c1ce4ea4a090a5e-runc.thJSp0.mount: Deactivated successfully. Dec 13 14:17:40.658256 kubelet[2369]: E1213 14:17:40.658077 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:41.658948 kubelet[2369]: E1213 14:17:41.658880 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:42.659949 kubelet[2369]: E1213 14:17:42.659876 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:43.660688 kubelet[2369]: E1213 14:17:43.660649 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:44.662311 kubelet[2369]: E1213 14:17:44.662242 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:45.663797 kubelet[2369]: E1213 14:17:45.663752 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:46.665058 kubelet[2369]: E1213 14:17:46.664990 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:47.553201 kubelet[2369]: E1213 14:17:47.553097 2369 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:47.665706 kubelet[2369]: E1213 14:17:47.665603 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:48.666661 kubelet[2369]: E1213 14:17:48.666615 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:49.668138 kubelet[2369]: E1213 14:17:49.668085 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:49.764800 kubelet[2369]: E1213 14:17:49.764745 2369 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:50.205027 kubelet[2369]: E1213 14:17:50.204970 2369 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": unexpected EOF" Dec 13 14:17:50.217300 kubelet[2369]: E1213 14:17:50.217241 2369 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": read tcp 172.31.19.77:55772->172.31.26.163:6443: read: connection reset by peer" Dec 13 14:17:50.217912 kubelet[2369]: I1213 14:17:50.217881 2369 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Dec 13 14:17:50.219493 kubelet[2369]: E1213 14:17:50.219444 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" interval="200ms" Dec 13 14:17:50.420625 kubelet[2369]: E1213 14:17:50.420565 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" interval="400ms" Dec 13 14:17:50.639861 kubelet[2369]: E1213 14:17:50.639804 2369 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.19.77\": Get \"https://172.31.26.163:6443/api/v1/nodes/172.31.19.77?resourceVersion=0&timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" Dec 13 14:17:50.640442 kubelet[2369]: E1213 14:17:50.640413 2369 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.19.77\": Get \"https://172.31.26.163:6443/api/v1/nodes/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" Dec 13 14:17:50.641103 kubelet[2369]: E1213 14:17:50.641057 2369 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.19.77\": Get \"https://172.31.26.163:6443/api/v1/nodes/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" Dec 13 14:17:50.641707 kubelet[2369]: E1213 14:17:50.641661 2369 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.19.77\": Get \"https://172.31.26.163:6443/api/v1/nodes/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" Dec 13 14:17:50.642307 kubelet[2369]: E1213 14:17:50.642245 2369 kubelet_node_status.go:544] "Error updating node status, will retry" err="error getting node \"172.31.19.77\": Get \"https://172.31.26.163:6443/api/v1/nodes/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" Dec 13 14:17:50.642476 kubelet[2369]: E1213 14:17:50.642448 2369 kubelet_node_status.go:531] "Unable to update node status" err="update node status exceeds retry count" Dec 13 14:17:50.668576 kubelet[2369]: E1213 14:17:50.668547 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:50.822234 kubelet[2369]: E1213 14:17:50.822173 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" interval="800ms" Dec 13 14:17:51.624232 kubelet[2369]: E1213 14:17:51.624148 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" interval="1.6s" Dec 13 14:17:51.670045 kubelet[2369]: E1213 14:17:51.669973 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:52.670763 kubelet[2369]: E1213 14:17:52.670697 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:53.225986 kubelet[2369]: E1213 14:17:53.225924 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.163:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.77?timeout=10s\": dial tcp 172.31.26.163:6443: connect: connection refused" interval="3.2s" Dec 13 14:17:53.671538 kubelet[2369]: E1213 14:17:53.671464 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:54.671650 kubelet[2369]: E1213 14:17:54.671600 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:55.672673 kubelet[2369]: E1213 14:17:55.672600 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:56.673035 kubelet[2369]: E1213 14:17:56.672967 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:57.674010 kubelet[2369]: E1213 14:17:57.673939 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:58.674803 kubelet[2369]: E1213 14:17:58.674761 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:59.676533 kubelet[2369]: E1213 14:17:59.676484 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:00.678068 kubelet[2369]: E1213 14:18:00.678001 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:01.678605 kubelet[2369]: E1213 14:18:01.678555 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:02.679670 kubelet[2369]: E1213 14:18:02.679597 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:03.679949 kubelet[2369]: E1213 14:18:03.679859 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:04.680724 kubelet[2369]: E1213 14:18:04.680672 2369 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"