Dec 13 14:16:51.949377 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Dec 13 14:16:51.949411 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:16:51.949434 kernel: efi: EFI v2.70 by EDK II Dec 13 14:16:51.949449 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Dec 13 14:16:51.949462 kernel: ACPI: Early table checksum verification disabled Dec 13 14:16:51.949476 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Dec 13 14:16:51.949492 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Dec 13 14:16:51.949506 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:16:51.949519 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Dec 13 14:16:51.949533 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:16:51.949551 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Dec 13 14:16:51.949565 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Dec 13 14:16:51.949578 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Dec 13 14:16:51.949592 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:16:51.949609 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Dec 13 14:16:51.949628 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Dec 13 14:16:51.949642 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Dec 13 14:16:51.949656 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Dec 13 14:16:51.949671 kernel: printk: bootconsole [uart0] enabled Dec 13 14:16:51.949685 kernel: NUMA: Failed to initialise from firmware Dec 13 14:16:51.949700 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:16:51.949714 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Dec 13 14:16:51.949729 kernel: Zone ranges: Dec 13 14:16:51.949744 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Dec 13 14:16:51.949758 kernel: DMA32 empty Dec 13 14:16:51.949772 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Dec 13 14:16:51.949791 kernel: Movable zone start for each node Dec 13 14:16:51.949805 kernel: Early memory node ranges Dec 13 14:16:51.949819 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Dec 13 14:16:51.949834 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Dec 13 14:16:51.949848 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Dec 13 14:16:51.949863 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Dec 13 14:16:51.949877 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Dec 13 14:16:51.949892 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Dec 13 14:16:51.949906 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Dec 13 14:16:51.949920 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Dec 13 14:16:51.949960 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:16:51.949977 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Dec 13 14:16:51.949998 kernel: psci: probing for conduit method from ACPI. Dec 13 14:16:51.950013 kernel: psci: PSCIv1.0 detected in firmware. Dec 13 14:16:51.950034 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:16:51.950050 kernel: psci: Trusted OS migration not required Dec 13 14:16:51.950065 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:16:51.950084 kernel: ACPI: SRAT not present Dec 13 14:16:51.950100 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:16:51.950115 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:16:51.950131 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:16:51.950146 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:16:51.950161 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:16:51.950176 kernel: CPU features: detected: Spectre-v2 Dec 13 14:16:51.950191 kernel: CPU features: detected: Spectre-v3a Dec 13 14:16:51.950206 kernel: CPU features: detected: Spectre-BHB Dec 13 14:16:51.950221 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:16:51.950236 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:16:51.950255 kernel: CPU features: detected: ARM erratum 1742098 Dec 13 14:16:51.950271 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Dec 13 14:16:51.950286 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Dec 13 14:16:51.950301 kernel: Policy zone: Normal Dec 13 14:16:51.950318 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:16:51.950334 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:16:51.950349 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:16:51.950365 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:16:51.950380 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:16:51.950395 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Dec 13 14:16:51.950415 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Dec 13 14:16:51.950431 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:16:51.950446 kernel: trace event string verifier disabled Dec 13 14:16:51.950461 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:16:51.950477 kernel: rcu: RCU event tracing is enabled. Dec 13 14:16:51.950493 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:16:51.950509 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:16:51.950543 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:16:51.950559 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:16:51.950574 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:16:51.950589 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:16:51.950604 kernel: GICv3: 96 SPIs implemented Dec 13 14:16:51.950624 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:16:51.950639 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:16:51.950654 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:16:51.950669 kernel: GICv3: 16 PPIs implemented Dec 13 14:16:51.950684 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Dec 13 14:16:51.950699 kernel: ACPI: SRAT not present Dec 13 14:16:51.950714 kernel: ITS [mem 0x10080000-0x1009ffff] Dec 13 14:16:51.950729 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:16:51.950744 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:16:51.950760 kernel: GICv3: using LPI property table @0x00000004000b0000 Dec 13 14:16:51.950775 kernel: ITS: Using hypervisor restricted LPI range [128] Dec 13 14:16:51.950793 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Dec 13 14:16:51.950824 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Dec 13 14:16:51.950842 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Dec 13 14:16:51.950858 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Dec 13 14:16:51.950874 kernel: Console: colour dummy device 80x25 Dec 13 14:16:51.950890 kernel: printk: console [tty1] enabled Dec 13 14:16:51.950906 kernel: ACPI: Core revision 20210730 Dec 13 14:16:51.950922 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Dec 13 14:16:51.950956 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:16:51.950973 kernel: LSM: Security Framework initializing Dec 13 14:16:51.950993 kernel: SELinux: Initializing. Dec 13 14:16:51.951009 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:16:51.951025 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:16:51.951040 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:16:51.951056 kernel: Platform MSI: ITS@0x10080000 domain created Dec 13 14:16:51.951071 kernel: PCI/MSI: ITS@0x10080000 domain created Dec 13 14:16:51.951086 kernel: Remapping and enabling EFI services. Dec 13 14:16:51.951101 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:16:51.951117 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:16:51.951132 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Dec 13 14:16:51.951152 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Dec 13 14:16:51.951168 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Dec 13 14:16:51.951183 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:16:51.951198 kernel: SMP: Total of 2 processors activated. Dec 13 14:16:51.951213 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:16:51.951229 kernel: CPU features: detected: 32-bit EL1 Support Dec 13 14:16:51.951244 kernel: CPU features: detected: CRC32 instructions Dec 13 14:16:51.951259 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:16:51.951274 kernel: alternatives: patching kernel code Dec 13 14:16:51.951294 kernel: devtmpfs: initialized Dec 13 14:16:51.951309 kernel: KASLR disabled due to lack of seed Dec 13 14:16:51.951335 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:16:51.951355 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:16:51.951371 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:16:51.951387 kernel: SMBIOS 3.0.0 present. Dec 13 14:16:51.951403 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Dec 13 14:16:51.951419 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:16:51.951435 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:16:51.951451 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:16:51.951467 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:16:51.951487 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:16:51.951504 kernel: audit: type=2000 audit(0.248:1): state=initialized audit_enabled=0 res=1 Dec 13 14:16:51.951519 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:16:51.951535 kernel: cpuidle: using governor menu Dec 13 14:16:51.951551 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:16:51.951571 kernel: ASID allocator initialised with 32768 entries Dec 13 14:16:51.951600 kernel: ACPI: bus type PCI registered Dec 13 14:16:51.951619 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:16:51.951636 kernel: Serial: AMBA PL011 UART driver Dec 13 14:16:51.951652 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:16:51.951668 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:16:51.951684 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:16:51.951700 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:16:51.951716 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:16:51.951737 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:16:51.951753 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:16:51.951769 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:16:51.951785 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:16:51.951800 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:16:51.951817 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:16:51.951833 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:16:51.951848 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:16:51.951864 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:16:51.951884 kernel: ACPI: Interpreter enabled Dec 13 14:16:51.951901 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:16:51.958606 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:16:51.958652 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Dec 13 14:16:51.958947 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:16:51.959161 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:16:51.964031 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:16:51.964260 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Dec 13 14:16:51.964485 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Dec 13 14:16:51.964509 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Dec 13 14:16:51.964527 kernel: acpiphp: Slot [1] registered Dec 13 14:16:51.964544 kernel: acpiphp: Slot [2] registered Dec 13 14:16:51.964560 kernel: acpiphp: Slot [3] registered Dec 13 14:16:51.964576 kernel: acpiphp: Slot [4] registered Dec 13 14:16:51.964593 kernel: acpiphp: Slot [5] registered Dec 13 14:16:51.964608 kernel: acpiphp: Slot [6] registered Dec 13 14:16:51.964624 kernel: acpiphp: Slot [7] registered Dec 13 14:16:51.964645 kernel: acpiphp: Slot [8] registered Dec 13 14:16:51.964661 kernel: acpiphp: Slot [9] registered Dec 13 14:16:51.964677 kernel: acpiphp: Slot [10] registered Dec 13 14:16:51.964692 kernel: acpiphp: Slot [11] registered Dec 13 14:16:51.964709 kernel: acpiphp: Slot [12] registered Dec 13 14:16:51.964725 kernel: acpiphp: Slot [13] registered Dec 13 14:16:51.964740 kernel: acpiphp: Slot [14] registered Dec 13 14:16:51.964756 kernel: acpiphp: Slot [15] registered Dec 13 14:16:51.964772 kernel: acpiphp: Slot [16] registered Dec 13 14:16:51.964792 kernel: acpiphp: Slot [17] registered Dec 13 14:16:51.964808 kernel: acpiphp: Slot [18] registered Dec 13 14:16:51.964824 kernel: acpiphp: Slot [19] registered Dec 13 14:16:51.964840 kernel: acpiphp: Slot [20] registered Dec 13 14:16:51.964856 kernel: acpiphp: Slot [21] registered Dec 13 14:16:51.964871 kernel: acpiphp: Slot [22] registered Dec 13 14:16:51.964887 kernel: acpiphp: Slot [23] registered Dec 13 14:16:51.964904 kernel: acpiphp: Slot [24] registered Dec 13 14:16:51.964919 kernel: acpiphp: Slot [25] registered Dec 13 14:16:51.964953 kernel: acpiphp: Slot [26] registered Dec 13 14:16:51.964977 kernel: acpiphp: Slot [27] registered Dec 13 14:16:51.964993 kernel: acpiphp: Slot [28] registered Dec 13 14:16:51.965009 kernel: acpiphp: Slot [29] registered Dec 13 14:16:51.965025 kernel: acpiphp: Slot [30] registered Dec 13 14:16:51.965041 kernel: acpiphp: Slot [31] registered Dec 13 14:16:51.965057 kernel: PCI host bridge to bus 0000:00 Dec 13 14:16:51.965281 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Dec 13 14:16:51.965483 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:16:51.965684 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Dec 13 14:16:51.965908 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Dec 13 14:16:51.966149 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Dec 13 14:16:51.966361 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Dec 13 14:16:51.966579 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Dec 13 14:16:51.966800 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:16:51.967015 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Dec 13 14:16:51.967229 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:16:51.967459 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:16:51.967656 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Dec 13 14:16:51.967850 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Dec 13 14:16:51.968093 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Dec 13 14:16:51.968413 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:16:51.973997 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Dec 13 14:16:51.974241 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Dec 13 14:16:51.974464 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Dec 13 14:16:51.974704 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Dec 13 14:16:51.974942 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Dec 13 14:16:51.975155 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Dec 13 14:16:51.975353 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:16:51.975561 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Dec 13 14:16:51.975584 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:16:51.975602 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:16:51.975618 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:16:51.975635 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:16:51.975651 kernel: iommu: Default domain type: Translated Dec 13 14:16:51.975668 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:16:51.975684 kernel: vgaarb: loaded Dec 13 14:16:51.975700 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:16:51.975721 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:16:51.975738 kernel: PTP clock support registered Dec 13 14:16:51.975754 kernel: Registered efivars operations Dec 13 14:16:51.975770 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:16:51.975787 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:16:51.975803 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:16:51.975819 kernel: pnp: PnP ACPI init Dec 13 14:16:51.976061 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Dec 13 14:16:51.976091 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:16:51.976109 kernel: NET: Registered PF_INET protocol family Dec 13 14:16:51.976125 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:16:51.976142 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:16:51.976159 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:16:51.976175 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:16:51.976191 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:16:51.976208 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:16:51.976224 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:16:51.976244 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:16:51.976261 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:16:51.976277 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:16:51.976294 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Dec 13 14:16:51.976310 kernel: kvm [1]: HYP mode not available Dec 13 14:16:51.976326 kernel: Initialise system trusted keyrings Dec 13 14:16:51.976342 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:16:51.976358 kernel: Key type asymmetric registered Dec 13 14:16:51.976374 kernel: Asymmetric key parser 'x509' registered Dec 13 14:16:51.976394 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:16:51.976411 kernel: io scheduler mq-deadline registered Dec 13 14:16:51.976427 kernel: io scheduler kyber registered Dec 13 14:16:51.976443 kernel: io scheduler bfq registered Dec 13 14:16:51.976659 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Dec 13 14:16:51.976683 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:16:51.976700 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:16:51.976716 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Dec 13 14:16:51.976736 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:16:51.976753 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:16:51.976770 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Dec 13 14:16:51.977001 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Dec 13 14:16:51.977025 kernel: printk: console [ttyS0] disabled Dec 13 14:16:51.977042 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Dec 13 14:16:51.977059 kernel: printk: console [ttyS0] enabled Dec 13 14:16:51.977075 kernel: printk: bootconsole [uart0] disabled Dec 13 14:16:51.977091 kernel: thunder_xcv, ver 1.0 Dec 13 14:16:51.977106 kernel: thunder_bgx, ver 1.0 Dec 13 14:16:51.977127 kernel: nicpf, ver 1.0 Dec 13 14:16:51.977143 kernel: nicvf, ver 1.0 Dec 13 14:16:51.977413 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:16:51.977620 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:16:51 UTC (1734099411) Dec 13 14:16:51.977643 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:16:51.977660 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:16:51.977676 kernel: Segment Routing with IPv6 Dec 13 14:16:51.977692 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:16:51.977714 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:16:51.977729 kernel: Key type dns_resolver registered Dec 13 14:16:51.977760 kernel: registered taskstats version 1 Dec 13 14:16:51.977777 kernel: Loading compiled-in X.509 certificates Dec 13 14:16:51.977793 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:16:51.977810 kernel: Key type .fscrypt registered Dec 13 14:16:51.977825 kernel: Key type fscrypt-provisioning registered Dec 13 14:16:51.977841 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:16:51.977857 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:16:51.977878 kernel: ima: No architecture policies found Dec 13 14:16:51.977894 kernel: clk: Disabling unused clocks Dec 13 14:16:51.977910 kernel: Freeing unused kernel memory: 36416K Dec 13 14:16:51.977926 kernel: Run /init as init process Dec 13 14:16:51.977960 kernel: with arguments: Dec 13 14:16:51.977977 kernel: /init Dec 13 14:16:51.977993 kernel: with environment: Dec 13 14:16:51.978008 kernel: HOME=/ Dec 13 14:16:51.978024 kernel: TERM=linux Dec 13 14:16:51.978045 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:16:51.978066 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:16:51.978087 systemd[1]: Detected virtualization amazon. Dec 13 14:16:51.978105 systemd[1]: Detected architecture arm64. Dec 13 14:16:51.978123 systemd[1]: Running in initrd. Dec 13 14:16:51.978140 systemd[1]: No hostname configured, using default hostname. Dec 13 14:16:51.978157 systemd[1]: Hostname set to . Dec 13 14:16:51.978180 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:16:51.978197 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:16:51.978215 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:16:51.978232 systemd[1]: Reached target cryptsetup.target. Dec 13 14:16:51.978249 systemd[1]: Reached target paths.target. Dec 13 14:16:51.978266 systemd[1]: Reached target slices.target. Dec 13 14:16:51.978283 systemd[1]: Reached target swap.target. Dec 13 14:16:51.978301 systemd[1]: Reached target timers.target. Dec 13 14:16:51.978323 systemd[1]: Listening on iscsid.socket. Dec 13 14:16:51.978341 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:16:51.978358 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:16:51.978376 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:16:51.978394 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:16:51.978412 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:16:51.978429 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:16:51.978447 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:16:51.978468 systemd[1]: Reached target sockets.target. Dec 13 14:16:51.978486 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:16:51.978504 systemd[1]: Finished network-cleanup.service. Dec 13 14:16:51.978540 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:16:51.978559 systemd[1]: Starting systemd-journald.service... Dec 13 14:16:51.978577 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:16:51.978595 systemd[1]: Starting systemd-resolved.service... Dec 13 14:16:51.978612 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:16:51.978630 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:16:51.978653 kernel: audit: type=1130 audit(1734099411.944:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:51.978671 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:16:51.978689 kernel: audit: type=1130 audit(1734099411.957:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:51.978706 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:16:51.978723 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:16:51.978741 kernel: audit: type=1130 audit(1734099411.968:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:51.978761 systemd-journald[309]: Journal started Dec 13 14:16:51.978850 systemd-journald[309]: Runtime Journal (/run/log/journal/ec24b9eb683261aa6548e49cde9dc883) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:16:51.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:51.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:51.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:51.954719 systemd-modules-load[310]: Inserted module 'overlay' Dec 13 14:16:51.990988 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:16:52.018749 systemd[1]: Started systemd-journald.service. Dec 13 14:16:52.018817 kernel: audit: type=1130 audit(1734099412.009:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.025646 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:16:52.036058 kernel: audit: type=1130 audit(1734099412.025:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.037558 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:16:52.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.041544 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:16:52.052248 kernel: audit: type=1130 audit(1734099412.037:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.049990 systemd-resolved[311]: Positive Trust Anchors: Dec 13 14:16:52.050004 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:16:52.050058 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:16:52.087044 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:16:52.093962 kernel: Bridge firewalling registered Dec 13 14:16:52.093161 systemd-modules-load[310]: Inserted module 'br_netfilter' Dec 13 14:16:52.096082 dracut-cmdline[326]: dracut-dracut-053 Dec 13 14:16:52.102422 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:16:52.126965 kernel: SCSI subsystem initialized Dec 13 14:16:52.146427 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:16:52.146497 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:16:52.150121 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:16:52.165138 systemd-modules-load[310]: Inserted module 'dm_multipath' Dec 13 14:16:52.167891 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:16:52.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.172240 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:16:52.186976 kernel: audit: type=1130 audit(1734099412.168:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.202912 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:16:52.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.212967 kernel: audit: type=1130 audit(1734099412.201:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.281961 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:16:52.299968 kernel: iscsi: registered transport (tcp) Dec 13 14:16:52.326769 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:16:52.326841 kernel: QLogic iSCSI HBA Driver Dec 13 14:16:52.522626 systemd-resolved[311]: Defaulting to hostname 'linux'. Dec 13 14:16:52.524804 kernel: random: crng init done Dec 13 14:16:52.526010 systemd[1]: Started systemd-resolved.service. Dec 13 14:16:52.537989 kernel: audit: type=1130 audit(1734099412.526:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.527791 systemd[1]: Reached target nss-lookup.target. Dec 13 14:16:52.549483 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:16:52.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:52.553514 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:16:52.618976 kernel: raid6: neonx8 gen() 6376 MB/s Dec 13 14:16:52.636963 kernel: raid6: neonx8 xor() 4584 MB/s Dec 13 14:16:52.654960 kernel: raid6: neonx4 gen() 6550 MB/s Dec 13 14:16:52.672962 kernel: raid6: neonx4 xor() 4738 MB/s Dec 13 14:16:52.690961 kernel: raid6: neonx2 gen() 5767 MB/s Dec 13 14:16:52.708962 kernel: raid6: neonx2 xor() 4375 MB/s Dec 13 14:16:52.726964 kernel: raid6: neonx1 gen() 4479 MB/s Dec 13 14:16:52.744961 kernel: raid6: neonx1 xor() 3591 MB/s Dec 13 14:16:52.762960 kernel: raid6: int64x8 gen() 3437 MB/s Dec 13 14:16:52.780962 kernel: raid6: int64x8 xor() 2050 MB/s Dec 13 14:16:52.798962 kernel: raid6: int64x4 gen() 3839 MB/s Dec 13 14:16:52.816962 kernel: raid6: int64x4 xor() 2160 MB/s Dec 13 14:16:52.834961 kernel: raid6: int64x2 gen() 3597 MB/s Dec 13 14:16:52.852963 kernel: raid6: int64x2 xor() 1926 MB/s Dec 13 14:16:52.870961 kernel: raid6: int64x1 gen() 2755 MB/s Dec 13 14:16:52.890105 kernel: raid6: int64x1 xor() 1434 MB/s Dec 13 14:16:52.890136 kernel: raid6: using algorithm neonx4 gen() 6550 MB/s Dec 13 14:16:52.890160 kernel: raid6: .... xor() 4738 MB/s, rmw enabled Dec 13 14:16:52.891736 kernel: raid6: using neon recovery algorithm Dec 13 14:16:52.909968 kernel: xor: measuring software checksum speed Dec 13 14:16:52.913257 kernel: 8regs : 8768 MB/sec Dec 13 14:16:52.913295 kernel: 32regs : 11077 MB/sec Dec 13 14:16:52.915055 kernel: arm64_neon : 9586 MB/sec Dec 13 14:16:52.915086 kernel: xor: using function: 32regs (11077 MB/sec) Dec 13 14:16:53.007983 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:16:53.025280 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:16:53.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.026000 audit: BPF prog-id=7 op=LOAD Dec 13 14:16:53.026000 audit: BPF prog-id=8 op=LOAD Dec 13 14:16:53.030400 systemd[1]: Starting systemd-udevd.service... Dec 13 14:16:53.058907 systemd-udevd[508]: Using default interface naming scheme 'v252'. Dec 13 14:16:53.068711 systemd[1]: Started systemd-udevd.service. Dec 13 14:16:53.076511 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:16:53.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.104359 dracut-pre-trigger[519]: rd.md=0: removing MD RAID activation Dec 13 14:16:53.164282 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:16:53.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.168679 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:16:53.282079 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:16:53.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.407288 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:16:53.407364 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Dec 13 14:16:53.426408 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Dec 13 14:16:53.426438 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:16:53.426720 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:16:53.427053 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:16:53.427315 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:16:53.427524 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:06:ac:75:5c:75 Dec 13 14:16:53.433258 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:16:53.433328 kernel: GPT:9289727 != 16777215 Dec 13 14:16:53.435340 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:16:53.436574 kernel: GPT:9289727 != 16777215 Dec 13 14:16:53.438317 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:16:53.439729 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:16:53.443893 (udev-worker)[557]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:16:53.536327 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:16:53.539557 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (556) Dec 13 14:16:53.612509 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:16:53.644429 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:16:53.664962 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:16:53.667393 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:16:53.672747 systemd[1]: Starting disk-uuid.service... Dec 13 14:16:53.689976 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:16:53.691173 disk-uuid[667]: Primary Header is updated. Dec 13 14:16:53.691173 disk-uuid[667]: Secondary Entries is updated. Dec 13 14:16:53.691173 disk-uuid[667]: Secondary Header is updated. Dec 13 14:16:53.705965 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:16:54.714618 disk-uuid[668]: The operation has completed successfully. Dec 13 14:16:54.716662 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:16:54.885217 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:16:54.887363 systemd[1]: Finished disk-uuid.service. Dec 13 14:16:54.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:54.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:54.901578 systemd[1]: Starting verity-setup.service... Dec 13 14:16:54.944975 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:16:55.056137 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:16:55.060855 systemd[1]: Finished verity-setup.service. Dec 13 14:16:55.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.065192 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:16:55.148981 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:16:55.150351 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:16:55.150871 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:16:55.152362 systemd[1]: Starting ignition-setup.service... Dec 13 14:16:55.160395 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:16:55.181398 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:16:55.181474 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:16:55.183685 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:16:55.191979 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:16:55.208831 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:16:55.251453 systemd[1]: Finished ignition-setup.service. Dec 13 14:16:55.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.255767 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:16:55.310284 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:16:55.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.312000 audit: BPF prog-id=9 op=LOAD Dec 13 14:16:55.315631 systemd[1]: Starting systemd-networkd.service... Dec 13 14:16:55.361117 systemd-networkd[1191]: lo: Link UP Dec 13 14:16:55.361140 systemd-networkd[1191]: lo: Gained carrier Dec 13 14:16:55.363625 systemd-networkd[1191]: Enumeration completed Dec 13 14:16:55.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.363776 systemd[1]: Started systemd-networkd.service. Dec 13 14:16:55.366725 systemd[1]: Reached target network.target. Dec 13 14:16:55.370332 systemd-networkd[1191]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:16:55.376748 systemd-networkd[1191]: eth0: Link UP Dec 13 14:16:55.376768 systemd-networkd[1191]: eth0: Gained carrier Dec 13 14:16:55.377354 systemd[1]: Starting iscsiuio.service... Dec 13 14:16:55.390159 systemd-networkd[1191]: eth0: DHCPv4 address 172.31.27.246/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:16:55.393177 systemd[1]: Started iscsiuio.service. Dec 13 14:16:55.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.397546 systemd[1]: Starting iscsid.service... Dec 13 14:16:55.410914 systemd[1]: Started iscsid.service. Dec 13 14:16:55.413555 iscsid[1196]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:16:55.413555 iscsid[1196]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:16:55.413555 iscsid[1196]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:16:55.413555 iscsid[1196]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:16:55.413555 iscsid[1196]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:16:55.413555 iscsid[1196]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:16:55.413555 iscsid[1196]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:16:55.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.437513 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:16:55.460867 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:16:55.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:55.464027 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:16:55.465607 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:16:55.467227 systemd[1]: Reached target remote-fs.target. Dec 13 14:16:55.470422 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:16:55.492478 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:16:55.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.408826 ignition[1145]: Ignition 2.14.0 Dec 13 14:16:56.408856 ignition[1145]: Stage: fetch-offline Dec 13 14:16:56.409209 ignition[1145]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:56.409316 ignition[1145]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:56.429287 ignition[1145]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:56.430473 ignition[1145]: Ignition finished successfully Dec 13 14:16:56.434746 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:16:56.448815 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:16:56.448882 kernel: audit: type=1130 audit(1734099416.435:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.438773 systemd[1]: Starting ignition-fetch.service... Dec 13 14:16:56.461668 ignition[1215]: Ignition 2.14.0 Dec 13 14:16:56.463258 ignition[1215]: Stage: fetch Dec 13 14:16:56.464616 ignition[1215]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:56.464703 ignition[1215]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:56.477652 ignition[1215]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:56.481331 ignition[1215]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:56.496185 ignition[1215]: INFO : PUT result: OK Dec 13 14:16:56.499257 ignition[1215]: DEBUG : parsed url from cmdline: "" Dec 13 14:16:56.500983 ignition[1215]: INFO : no config URL provided Dec 13 14:16:56.500983 ignition[1215]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:16:56.500983 ignition[1215]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:16:56.500983 ignition[1215]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:56.508891 ignition[1215]: INFO : PUT result: OK Dec 13 14:16:56.508891 ignition[1215]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:16:56.512458 ignition[1215]: INFO : GET result: OK Dec 13 14:16:56.513789 ignition[1215]: DEBUG : parsing config with SHA512: 1975143fa4372d691e9d52d2670e5ebe518cdb6002279f9621b06d8f39f5cf70c7d9a3bea873a843c87c097deb3b594778061e13741d0e5ed5e366df7173bfdc Dec 13 14:16:56.522144 unknown[1215]: fetched base config from "system" Dec 13 14:16:56.522165 unknown[1215]: fetched base config from "system" Dec 13 14:16:56.523298 ignition[1215]: fetch: fetch complete Dec 13 14:16:56.522180 unknown[1215]: fetched user config from "aws" Dec 13 14:16:56.523312 ignition[1215]: fetch: fetch passed Dec 13 14:16:56.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.528654 systemd[1]: Finished ignition-fetch.service. Dec 13 14:16:56.523393 ignition[1215]: Ignition finished successfully Dec 13 14:16:56.545182 systemd[1]: Starting ignition-kargs.service... Dec 13 14:16:56.550420 kernel: audit: type=1130 audit(1734099416.534:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.563963 ignition[1221]: Ignition 2.14.0 Dec 13 14:16:56.563992 ignition[1221]: Stage: kargs Dec 13 14:16:56.564280 ignition[1221]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:56.564333 ignition[1221]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:56.577380 ignition[1221]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:56.579546 ignition[1221]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:56.582336 ignition[1221]: INFO : PUT result: OK Dec 13 14:16:56.586695 ignition[1221]: kargs: kargs passed Dec 13 14:16:56.586977 ignition[1221]: Ignition finished successfully Dec 13 14:16:56.591154 systemd[1]: Finished ignition-kargs.service. Dec 13 14:16:56.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.595448 systemd[1]: Starting ignition-disks.service... Dec 13 14:16:56.604416 kernel: audit: type=1130 audit(1734099416.592:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.611324 ignition[1227]: Ignition 2.14.0 Dec 13 14:16:56.611350 ignition[1227]: Stage: disks Dec 13 14:16:56.611671 ignition[1227]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:56.611729 ignition[1227]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:56.628767 ignition[1227]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:56.631272 ignition[1227]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:56.633836 ignition[1227]: INFO : PUT result: OK Dec 13 14:16:56.638589 ignition[1227]: disks: disks passed Dec 13 14:16:56.638695 ignition[1227]: Ignition finished successfully Dec 13 14:16:56.642644 systemd[1]: Finished ignition-disks.service. Dec 13 14:16:56.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.645678 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:16:56.652502 kernel: audit: type=1130 audit(1734099416.644:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.655125 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:16:56.656773 systemd[1]: Reached target local-fs.target. Dec 13 14:16:56.659732 systemd[1]: Reached target sysinit.target. Dec 13 14:16:56.662547 systemd[1]: Reached target basic.target. Dec 13 14:16:56.665530 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:16:56.711068 systemd-fsck[1235]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:16:56.718881 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:16:56.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.729966 kernel: audit: type=1130 audit(1734099416.719:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:56.724233 systemd[1]: Mounting sysroot.mount... Dec 13 14:16:56.743978 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:16:56.745711 systemd[1]: Mounted sysroot.mount. Dec 13 14:16:56.750184 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:16:56.755536 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:16:56.763337 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:16:56.764573 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:16:56.764629 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:16:56.775443 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:16:56.804337 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:16:56.809039 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:16:56.829983 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1252) Dec 13 14:16:56.830632 initrd-setup-root[1257]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:16:56.839473 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:16:56.839552 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:16:56.841575 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:16:56.848971 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:16:56.853228 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:16:56.857888 initrd-setup-root[1283]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:16:56.867505 initrd-setup-root[1291]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:16:56.876392 initrd-setup-root[1299]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:16:57.080631 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:16:57.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:57.085029 systemd[1]: Starting ignition-mount.service... Dec 13 14:16:57.094776 systemd[1]: Starting sysroot-boot.service... Dec 13 14:16:57.096783 kernel: audit: type=1130 audit(1734099417.082:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:57.106392 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:16:57.106601 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:16:57.139229 systemd[1]: Finished sysroot-boot.service. Dec 13 14:16:57.144409 ignition[1319]: INFO : Ignition 2.14.0 Dec 13 14:16:57.155298 kernel: audit: type=1130 audit(1734099417.144:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:57.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:57.155405 ignition[1319]: INFO : Stage: mount Dec 13 14:16:57.155405 ignition[1319]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:57.155405 ignition[1319]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:57.170371 ignition[1319]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:57.170371 ignition[1319]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:57.175380 ignition[1319]: INFO : PUT result: OK Dec 13 14:16:57.179538 ignition[1319]: INFO : mount: mount passed Dec 13 14:16:57.181121 ignition[1319]: INFO : Ignition finished successfully Dec 13 14:16:57.184147 systemd[1]: Finished ignition-mount.service. Dec 13 14:16:57.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:57.187371 systemd[1]: Starting ignition-files.service... Dec 13 14:16:57.200081 kernel: audit: type=1130 audit(1734099417.182:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:57.202970 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:16:57.219987 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1327) Dec 13 14:16:57.225475 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:16:57.225536 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:16:57.225560 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:16:57.233963 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:16:57.238743 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:16:57.257163 ignition[1346]: INFO : Ignition 2.14.0 Dec 13 14:16:57.257163 ignition[1346]: INFO : Stage: files Dec 13 14:16:57.260434 ignition[1346]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:57.260434 ignition[1346]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:57.273790 ignition[1346]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:57.276190 ignition[1346]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:57.278440 ignition[1346]: INFO : PUT result: OK Dec 13 14:16:57.282814 ignition[1346]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:16:57.287207 ignition[1346]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:16:57.289909 ignition[1346]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:16:57.317348 ignition[1346]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:16:57.320212 ignition[1346]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:16:57.323173 unknown[1346]: wrote ssh authorized keys file for user: core Dec 13 14:16:57.325259 ignition[1346]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:16:57.327976 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:16:57.331329 ignition[1346]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:16:57.349342 ignition[1346]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3609120768" Dec 13 14:16:57.356468 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1348) Dec 13 14:16:57.356505 ignition[1346]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3609120768": device or resource busy Dec 13 14:16:57.356505 ignition[1346]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3609120768", trying btrfs: device or resource busy Dec 13 14:16:57.356505 ignition[1346]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3609120768" Dec 13 14:16:57.365421 ignition[1346]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3609120768" Dec 13 14:16:57.368977 ignition[1346]: INFO : op(3): [started] unmounting "/mnt/oem3609120768" Dec 13 14:16:57.371139 ignition[1346]: INFO : op(3): [finished] unmounting "/mnt/oem3609120768" Dec 13 14:16:57.371139 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:16:57.376241 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:16:57.379549 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:16:57.382819 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:16:57.386028 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:16:57.386028 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:16:57.393658 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:16:57.398121 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:16:57.401620 ignition[1346]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:16:57.406117 systemd-networkd[1191]: eth0: Gained IPv6LL Dec 13 14:16:57.415972 ignition[1346]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4193462303" Dec 13 14:16:57.415972 ignition[1346]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4193462303": device or resource busy Dec 13 14:16:57.415972 ignition[1346]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4193462303", trying btrfs: device or resource busy Dec 13 14:16:57.415972 ignition[1346]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4193462303" Dec 13 14:16:57.415972 ignition[1346]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4193462303" Dec 13 14:16:57.415972 ignition[1346]: INFO : op(6): [started] unmounting "/mnt/oem4193462303" Dec 13 14:16:57.415972 ignition[1346]: INFO : op(6): [finished] unmounting "/mnt/oem4193462303" Dec 13 14:16:57.415972 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:16:57.415972 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:16:57.415972 ignition[1346]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:16:57.446854 ignition[1346]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1993878487" Dec 13 14:16:57.449508 ignition[1346]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1993878487": device or resource busy Dec 13 14:16:57.449508 ignition[1346]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1993878487", trying btrfs: device or resource busy Dec 13 14:16:57.449508 ignition[1346]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1993878487" Dec 13 14:16:57.461252 ignition[1346]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1993878487" Dec 13 14:16:57.461252 ignition[1346]: INFO : op(9): [started] unmounting "/mnt/oem1993878487" Dec 13 14:16:57.461252 ignition[1346]: INFO : op(9): [finished] unmounting "/mnt/oem1993878487" Dec 13 14:16:57.461252 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:16:57.461252 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:16:57.461252 ignition[1346]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:16:57.476705 ignition[1346]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3584242305" Dec 13 14:16:57.476705 ignition[1346]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3584242305": device or resource busy Dec 13 14:16:57.476705 ignition[1346]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3584242305", trying btrfs: device or resource busy Dec 13 14:16:57.476705 ignition[1346]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3584242305" Dec 13 14:16:57.488192 ignition[1346]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3584242305" Dec 13 14:16:57.488192 ignition[1346]: INFO : op(c): [started] unmounting "/mnt/oem3584242305" Dec 13 14:16:57.488192 ignition[1346]: INFO : op(c): [finished] unmounting "/mnt/oem3584242305" Dec 13 14:16:57.488192 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:16:57.488192 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:16:57.488192 ignition[1346]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 Dec 13 14:16:57.998325 ignition[1346]: INFO : GET result: OK Dec 13 14:16:58.572117 ignition[1346]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(e): [started] processing unit "nvidia.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(e): [finished] processing unit "nvidia.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(f): [started] setting preset to enabled for "nvidia.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(f): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(10): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(10): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(11): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:16:58.580481 ignition[1346]: INFO : files: op(11): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:16:58.619114 ignition[1346]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:16:58.619114 ignition[1346]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:16:58.619114 ignition[1346]: INFO : files: files passed Dec 13 14:16:58.619114 ignition[1346]: INFO : Ignition finished successfully Dec 13 14:16:58.636617 systemd[1]: Finished ignition-files.service. Dec 13 14:16:58.646354 kernel: audit: type=1130 audit(1734099418.636:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.649639 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:16:58.651511 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:16:58.652872 systemd[1]: Starting ignition-quench.service... Dec 13 14:16:58.667270 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:16:58.669251 systemd[1]: Finished ignition-quench.service. Dec 13 14:16:58.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.680076 kernel: audit: type=1130 audit(1734099418.670:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.681406 initrd-setup-root-after-ignition[1371]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:16:58.685634 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:16:58.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.689618 systemd[1]: Reached target ignition-complete.target. Dec 13 14:16:58.694192 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:16:58.726020 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:16:58.726391 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:16:58.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.731440 systemd[1]: Reached target initrd-fs.target. Dec 13 14:16:58.738528 systemd[1]: Reached target initrd.target. Dec 13 14:16:58.741338 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:16:58.745120 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:16:58.767316 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:16:58.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.771734 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:16:58.792299 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:16:58.795604 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:16:58.799101 systemd[1]: Stopped target timers.target. Dec 13 14:16:58.802138 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:16:58.804221 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:16:58.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.807474 systemd[1]: Stopped target initrd.target. Dec 13 14:16:58.810344 systemd[1]: Stopped target basic.target. Dec 13 14:16:58.813187 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:16:58.816500 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:16:58.819741 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:16:58.823110 systemd[1]: Stopped target remote-fs.target. Dec 13 14:16:58.829606 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:16:58.832650 systemd[1]: Stopped target sysinit.target. Dec 13 14:16:58.835528 systemd[1]: Stopped target local-fs.target. Dec 13 14:16:58.838567 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:16:58.841518 systemd[1]: Stopped target swap.target. Dec 13 14:16:58.844122 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:16:58.846071 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:16:58.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.849154 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:16:58.852084 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:16:58.854032 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:16:58.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.857088 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:16:58.859416 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:16:58.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.863217 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:16:58.865055 systemd[1]: Stopped ignition-files.service. Dec 13 14:16:58.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.873204 systemd[1]: Stopping ignition-mount.service... Dec 13 14:16:58.884279 iscsid[1196]: iscsid shutting down. Dec 13 14:16:58.875177 systemd[1]: Stopping iscsid.service... Dec 13 14:16:58.889687 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:16:58.891216 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:16:58.895334 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:16:58.913252 ignition[1384]: INFO : Ignition 2.14.0 Dec 13 14:16:58.913252 ignition[1384]: INFO : Stage: umount Dec 13 14:16:58.913252 ignition[1384]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:16:58.913252 ignition[1384]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:16:58.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.950973 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:16:58.953198 ignition[1384]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:16:58.953198 ignition[1384]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:16:58.969225 ignition[1384]: INFO : PUT result: OK Dec 13 14:16:58.971146 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:16:58.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.977002 ignition[1384]: INFO : umount: umount passed Dec 13 14:16:58.978656 ignition[1384]: INFO : Ignition finished successfully Dec 13 14:16:58.983640 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:16:58.986723 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:16:58.988465 systemd[1]: Stopped iscsid.service. Dec 13 14:16:58.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.992146 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:16:58.993974 systemd[1]: Stopped ignition-mount.service. Dec 13 14:16:58.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.997865 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:16:58.999674 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:16:59.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.018333 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:16:59.020280 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:16:59.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.024663 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:16:59.024781 systemd[1]: Stopped ignition-disks.service. Dec 13 14:16:59.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.040270 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:16:59.040356 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:16:59.042005 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:16:59.042079 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:16:59.043707 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:16:59.043782 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:16:59.045684 systemd[1]: Stopped target paths.target. Dec 13 14:16:59.047082 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:16:59.057209 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:16:59.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.064795 systemd[1]: Stopped target slices.target. Dec 13 14:16:59.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.067392 systemd[1]: Stopped target sockets.target. Dec 13 14:16:59.069001 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:16:59.069077 systemd[1]: Closed iscsid.socket. Dec 13 14:16:59.072086 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:16:59.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.072173 systemd[1]: Stopped ignition-setup.service. Dec 13 14:16:59.074491 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:16:59.074591 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:16:59.077577 systemd[1]: Stopping iscsiuio.service... Dec 13 14:16:59.085590 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:16:59.085795 systemd[1]: Stopped iscsiuio.service. Dec 13 14:16:59.087709 systemd[1]: Stopped target network.target. Dec 13 14:16:59.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.089456 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:16:59.089526 systemd[1]: Closed iscsiuio.socket. Dec 13 14:16:59.110000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:16:59.092351 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:16:59.093830 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:16:59.103365 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:16:59.103581 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:16:59.111903 systemd-networkd[1191]: eth0: DHCPv6 lease lost Dec 13 14:16:59.122278 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:16:59.122650 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:16:59.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.125000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:16:59.128578 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:16:59.128644 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:16:59.135103 systemd[1]: Stopping network-cleanup.service... Dec 13 14:16:59.139658 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:16:59.140508 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:16:59.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.145066 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:16:59.145288 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:16:59.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.150067 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:16:59.150924 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:16:59.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.157539 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:16:59.165673 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:16:59.173803 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:16:59.178076 systemd[1]: Stopped network-cleanup.service. Dec 13 14:16:59.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.181844 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:16:59.183915 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:16:59.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.187595 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:16:59.189576 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:16:59.192770 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:16:59.193057 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:16:59.208315 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:16:59.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.209356 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:16:59.211568 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:16:59.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.211652 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:16:59.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.214551 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:16:59.214633 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:16:59.217476 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:16:59.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.229087 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:16:59.229214 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:16:59.231248 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:16:59.232285 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:16:59.237176 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:16:59.237295 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:16:59.241080 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:16:59.242601 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:16:59.242802 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:16:59.247378 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:16:59.251455 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:16:59.268392 systemd[1]: Switching root. Dec 13 14:16:59.306081 systemd-journald[309]: Received SIGTERM from PID 1 (n/a). Dec 13 14:16:59.306154 systemd-journald[309]: Journal stopped Dec 13 14:17:05.772120 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:17:05.772232 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:17:05.772266 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:17:05.772298 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:17:05.772329 kernel: SELinux: policy capability open_perms=1 Dec 13 14:17:05.772360 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:17:05.772393 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:17:05.772438 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:17:05.772471 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:17:05.772503 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:17:05.772536 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:17:05.772569 systemd[1]: Successfully loaded SELinux policy in 121.234ms. Dec 13 14:17:05.772631 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.669ms. Dec 13 14:17:05.772667 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:17:05.772701 systemd[1]: Detected virtualization amazon. Dec 13 14:17:05.772737 systemd[1]: Detected architecture arm64. Dec 13 14:17:05.772769 systemd[1]: Detected first boot. Dec 13 14:17:05.772802 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:17:05.772835 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:17:05.774970 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:17:05.775040 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:05.775081 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:05.775123 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:05.775158 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 14:17:05.775189 kernel: audit: type=1334 audit(1734099425.381:89): prog-id=12 op=LOAD Dec 13 14:17:05.775247 kernel: audit: type=1334 audit(1734099425.381:90): prog-id=3 op=UNLOAD Dec 13 14:17:05.775285 kernel: audit: type=1334 audit(1734099425.382:91): prog-id=13 op=LOAD Dec 13 14:17:05.775319 kernel: audit: type=1334 audit(1734099425.383:92): prog-id=14 op=LOAD Dec 13 14:17:05.775352 kernel: audit: type=1334 audit(1734099425.383:93): prog-id=4 op=UNLOAD Dec 13 14:17:05.775388 kernel: audit: type=1334 audit(1734099425.383:94): prog-id=5 op=UNLOAD Dec 13 14:17:05.775422 kernel: audit: type=1334 audit(1734099425.388:95): prog-id=15 op=LOAD Dec 13 14:17:05.775453 kernel: audit: type=1334 audit(1734099425.388:96): prog-id=12 op=UNLOAD Dec 13 14:17:05.775487 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:17:05.775522 kernel: audit: type=1334 audit(1734099425.390:97): prog-id=16 op=LOAD Dec 13 14:17:05.775552 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:17:05.775591 kernel: audit: type=1334 audit(1734099425.393:98): prog-id=17 op=LOAD Dec 13 14:17:05.775621 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:17:05.775660 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:17:05.775698 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:17:05.775740 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:17:05.775784 systemd[1]: Created slice system-getty.slice. Dec 13 14:17:05.775817 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:17:05.775850 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:17:05.775883 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:17:05.775914 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:17:05.776009 systemd[1]: Created slice user.slice. Dec 13 14:17:05.776045 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:17:05.776078 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:17:05.776110 systemd[1]: Set up automount boot.automount. Dec 13 14:17:05.776144 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:17:05.776176 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:17:05.776209 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:17:05.776240 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:17:05.776270 systemd[1]: Reached target integritysetup.target. Dec 13 14:17:05.776302 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:17:05.776336 systemd[1]: Reached target remote-fs.target. Dec 13 14:17:05.776368 systemd[1]: Reached target slices.target. Dec 13 14:17:05.776397 systemd[1]: Reached target swap.target. Dec 13 14:17:05.776427 systemd[1]: Reached target torcx.target. Dec 13 14:17:05.776458 systemd[1]: Reached target veritysetup.target. Dec 13 14:17:05.776488 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:17:05.776520 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:17:05.776550 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:17:05.776582 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:17:05.776619 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:17:05.776650 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:17:05.776683 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:17:05.776715 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:17:05.776750 systemd[1]: Mounting media.mount... Dec 13 14:17:05.776780 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:17:05.776812 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:17:05.776846 systemd[1]: Mounting tmp.mount... Dec 13 14:17:05.776879 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:17:05.776914 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:05.776970 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:17:05.777006 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:17:05.777037 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:05.777070 systemd[1]: Starting modprobe@drm.service... Dec 13 14:17:05.777101 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:05.777132 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:17:05.777162 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:05.777193 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:17:05.777229 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:17:05.777276 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:17:05.777308 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:17:05.777342 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:17:05.777371 kernel: fuse: init (API version 7.34) Dec 13 14:17:05.777399 systemd[1]: Stopped systemd-journald.service. Dec 13 14:17:05.777429 systemd[1]: Starting systemd-journald.service... Dec 13 14:17:05.777461 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:17:05.777491 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:17:05.777525 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:17:05.777555 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:17:05.777587 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:17:05.777617 systemd[1]: Stopped verity-setup.service. Dec 13 14:17:05.777645 kernel: loop: module loaded Dec 13 14:17:05.777673 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:17:05.777715 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:17:05.777750 systemd[1]: Mounted media.mount. Dec 13 14:17:05.777780 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:17:05.777809 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:17:05.777843 systemd[1]: Mounted tmp.mount. Dec 13 14:17:05.777872 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:17:05.777902 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:17:05.777950 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:17:05.783061 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:05.783097 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:05.783130 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:17:05.783172 systemd[1]: Finished modprobe@drm.service. Dec 13 14:17:05.783207 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:05.783250 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:05.783284 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:17:05.783318 systemd-journald[1500]: Journal started Dec 13 14:17:05.783438 systemd-journald[1500]: Runtime Journal (/run/log/journal/ec24b9eb683261aa6548e49cde9dc883) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:17:00.472000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:17:00.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:17:00.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:17:00.665000 audit: BPF prog-id=10 op=LOAD Dec 13 14:17:00.665000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:17:00.665000 audit: BPF prog-id=11 op=LOAD Dec 13 14:17:00.665000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:17:05.784923 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:17:00.965000 audit[1417]: AVC avc: denied { associate } for pid=1417 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:17:00.965000 audit[1417]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1400 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.965000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:17:00.969000 audit[1417]: AVC avc: denied { associate } for pid=1417 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:17:00.969000 audit[1417]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1400 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:00.969000 audit: CWD cwd="/" Dec 13 14:17:00.969000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:00.969000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:00.969000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:17:05.381000 audit: BPF prog-id=12 op=LOAD Dec 13 14:17:05.381000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:17:05.382000 audit: BPF prog-id=13 op=LOAD Dec 13 14:17:05.383000 audit: BPF prog-id=14 op=LOAD Dec 13 14:17:05.383000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:17:05.383000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:17:05.388000 audit: BPF prog-id=15 op=LOAD Dec 13 14:17:05.789427 systemd[1]: Started systemd-journald.service. Dec 13 14:17:05.388000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:17:05.390000 audit: BPF prog-id=16 op=LOAD Dec 13 14:17:05.393000 audit: BPF prog-id=17 op=LOAD Dec 13 14:17:05.393000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:17:05.393000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:17:05.395000 audit: BPF prog-id=18 op=LOAD Dec 13 14:17:05.395000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:17:05.397000 audit: BPF prog-id=19 op=LOAD Dec 13 14:17:05.399000 audit: BPF prog-id=20 op=LOAD Dec 13 14:17:05.399000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:17:05.399000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:17:05.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.409000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:17:05.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.660000 audit: BPF prog-id=21 op=LOAD Dec 13 14:17:05.660000 audit: BPF prog-id=22 op=LOAD Dec 13 14:17:05.660000 audit: BPF prog-id=23 op=LOAD Dec 13 14:17:05.660000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:17:05.660000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:17:05.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.767000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:17:05.767000 audit[1500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffcc584680 a2=4000 a3=1 items=0 ppid=1 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:05.767000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:17:05.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:00.963997 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:05.381238 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:17:00.964665 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:17:05.402788 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:17:00.964712 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:17:05.792291 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:00.964776 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:17:05.792603 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:00.964802 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:17:05.795716 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:17:00.964860 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:17:05.798027 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:17:00.964890 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:17:05.800499 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:17:00.965312 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:17:05.802829 systemd[1]: Reached target network-pre.target. Dec 13 14:17:00.965392 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:17:05.807003 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:17:00.965428 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:17:05.810919 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:17:00.966271 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:17:05.817757 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:17:00.966351 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:17:00.966395 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:17:00.966434 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:17:00.966478 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:17:00.966538 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:17:04.490138 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:04.490706 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:04.490969 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:04.491419 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:04.491526 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:17:05.822457 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:17:04.491661 /usr/lib/systemd/system-generators/torcx-generator[1417]: time="2024-12-13T14:17:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:17:05.848447 systemd-journald[1500]: Time spent on flushing to /var/log/journal/ec24b9eb683261aa6548e49cde9dc883 is 79.535ms for 1120 entries. Dec 13 14:17:05.848447 systemd-journald[1500]: System Journal (/var/log/journal/ec24b9eb683261aa6548e49cde9dc883) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:17:05.970550 systemd-journald[1500]: Received client request to flush runtime journal. Dec 13 14:17:05.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.826418 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:17:05.828208 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:05.830400 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:17:05.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.832207 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:05.834686 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:17:05.839747 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:17:05.841981 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:17:05.882362 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:17:05.886804 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:17:05.888907 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:17:05.904790 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:17:05.909649 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:17:05.973198 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:17:06.028913 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:17:06.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:06.033031 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:17:06.049013 udevadm[1536]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:17:06.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:06.103385 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:17:06.107416 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:17:06.185042 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:17:06.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:06.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:06.831000 audit: BPF prog-id=24 op=LOAD Dec 13 14:17:06.831000 audit: BPF prog-id=25 op=LOAD Dec 13 14:17:06.831000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:17:06.831000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:17:06.830577 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:17:06.834648 systemd[1]: Starting systemd-udevd.service... Dec 13 14:17:06.872812 systemd-udevd[1539]: Using default interface naming scheme 'v252'. Dec 13 14:17:06.905990 systemd[1]: Started systemd-udevd.service. Dec 13 14:17:06.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:06.908000 audit: BPF prog-id=26 op=LOAD Dec 13 14:17:06.912377 systemd[1]: Starting systemd-networkd.service... Dec 13 14:17:06.931000 audit: BPF prog-id=27 op=LOAD Dec 13 14:17:06.931000 audit: BPF prog-id=28 op=LOAD Dec 13 14:17:06.931000 audit: BPF prog-id=29 op=LOAD Dec 13 14:17:06.934056 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:17:06.994203 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:17:07.010215 (udev-worker)[1548]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:07.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.043013 systemd[1]: Started systemd-userdbd.service. Dec 13 14:17:07.196286 systemd-networkd[1545]: lo: Link UP Dec 13 14:17:07.196308 systemd-networkd[1545]: lo: Gained carrier Dec 13 14:17:07.197224 systemd-networkd[1545]: Enumeration completed Dec 13 14:17:07.197405 systemd[1]: Started systemd-networkd.service. Dec 13 14:17:07.197434 systemd-networkd[1545]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:17:07.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.201549 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:17:07.206064 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:07.217214 systemd-networkd[1545]: eth0: Link UP Dec 13 14:17:07.220402 systemd-networkd[1545]: eth0: Gained carrier Dec 13 14:17:07.232044 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1552) Dec 13 14:17:07.251180 systemd-networkd[1545]: eth0: DHCPv4 address 172.31.27.246/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:17:07.377488 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:17:07.380110 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:17:07.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.384271 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:17:07.455911 lvm[1658]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:17:07.497606 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:17:07.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.499585 systemd[1]: Reached target cryptsetup.target. Dec 13 14:17:07.503436 systemd[1]: Starting lvm2-activation.service... Dec 13 14:17:07.511457 lvm[1659]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:17:07.547731 systemd[1]: Finished lvm2-activation.service. Dec 13 14:17:07.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.549690 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:17:07.551387 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:17:07.551446 systemd[1]: Reached target local-fs.target. Dec 13 14:17:07.553099 systemd[1]: Reached target machines.target. Dec 13 14:17:07.556798 systemd[1]: Starting ldconfig.service... Dec 13 14:17:07.559021 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:07.559157 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:07.561475 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:17:07.565251 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:17:07.573638 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:17:07.577877 systemd[1]: Starting systemd-sysext.service... Dec 13 14:17:07.582279 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1661 (bootctl) Dec 13 14:17:07.584865 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:17:07.617644 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:17:07.629841 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:17:07.630245 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:17:07.653992 kernel: loop0: detected capacity change from 0 to 189592 Dec 13 14:17:07.682158 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:17:07.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.733996 systemd-fsck[1672]: fsck.fat 4.2 (2021-01-31) Dec 13 14:17:07.733996 systemd-fsck[1672]: /dev/nvme0n1p1: 236 files, 117175/258078 clusters Dec 13 14:17:07.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.736951 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:17:07.742565 systemd[1]: Mounting boot.mount... Dec 13 14:17:07.769804 systemd[1]: Mounted boot.mount. Dec 13 14:17:07.792783 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:17:07.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:07.937971 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:17:07.978976 kernel: loop1: detected capacity change from 0 to 189592 Dec 13 14:17:07.994849 (sd-sysext)[1689]: Using extensions 'kubernetes'. Dec 13 14:17:07.997445 (sd-sysext)[1689]: Merged extensions into '/usr'. Dec 13 14:17:08.034371 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:17:08.038505 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.041340 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:08.045438 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:08.050292 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:08.052915 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.053249 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:08.056170 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:08.057008 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:08.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.066308 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:17:08.068581 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:08.068870 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:08.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.071580 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:08.071890 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:08.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.076282 systemd[1]: Finished systemd-sysext.service. Dec 13 14:17:08.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.080534 systemd[1]: Starting ensure-sysext.service... Dec 13 14:17:08.082118 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:08.082285 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.085793 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:17:08.102778 systemd[1]: Reloading. Dec 13 14:17:08.117213 systemd-tmpfiles[1696]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:17:08.125873 systemd-tmpfiles[1696]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:17:08.130523 systemd-tmpfiles[1696]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:17:08.240339 /usr/lib/systemd/system-generators/torcx-generator[1716]: time="2024-12-13T14:17:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:08.241317 /usr/lib/systemd/system-generators/torcx-generator[1716]: time="2024-12-13T14:17:08Z" level=info msg="torcx already run" Dec 13 14:17:08.348078 systemd-networkd[1545]: eth0: Gained IPv6LL Dec 13 14:17:08.464656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:08.465263 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:08.517726 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:08.664000 audit: BPF prog-id=30 op=LOAD Dec 13 14:17:08.664000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:17:08.664000 audit: BPF prog-id=31 op=LOAD Dec 13 14:17:08.665000 audit: BPF prog-id=32 op=LOAD Dec 13 14:17:08.665000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:17:08.665000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:17:08.670000 audit: BPF prog-id=33 op=LOAD Dec 13 14:17:08.670000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:17:08.671000 audit: BPF prog-id=34 op=LOAD Dec 13 14:17:08.671000 audit: BPF prog-id=35 op=LOAD Dec 13 14:17:08.671000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:17:08.671000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:17:08.677000 audit: BPF prog-id=36 op=LOAD Dec 13 14:17:08.678000 audit: BPF prog-id=37 op=LOAD Dec 13 14:17:08.678000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:17:08.678000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:17:08.679000 audit: BPF prog-id=38 op=LOAD Dec 13 14:17:08.680000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:17:08.686977 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:17:08.691192 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:17:08.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.694559 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:17:08.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.699709 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:17:08.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.710312 systemd[1]: Starting audit-rules.service... Dec 13 14:17:08.714724 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:17:08.720033 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:17:08.723000 audit: BPF prog-id=39 op=LOAD Dec 13 14:17:08.730000 audit: BPF prog-id=40 op=LOAD Dec 13 14:17:08.726318 systemd[1]: Starting systemd-resolved.service... Dec 13 14:17:08.734838 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:17:08.738727 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:17:08.753623 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.756689 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:08.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.762456 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:08.766704 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:08.768341 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.768660 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:08.770494 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:08.770853 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:08.774488 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:17:08.776966 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:08.777177 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:08.780587 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.791000 audit[1779]: SYSTEM_BOOT pid=1779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.787030 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:08.788688 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.789090 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:08.789360 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:08.801545 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.805023 systemd[1]: Starting modprobe@drm.service... Dec 13 14:17:08.807363 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.807682 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:08.808064 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:08.809912 systemd[1]: Finished ensure-sysext.service. Dec 13 14:17:08.815006 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:08.815332 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:08.820360 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:17:08.840105 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:08.840411 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:08.842340 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:08.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.848441 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:17:08.848750 systemd[1]: Finished modprobe@drm.service. Dec 13 14:17:08.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.852759 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:08.853088 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:08.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.855065 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:08.859051 ldconfig[1660]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:17:08.880572 systemd[1]: Finished ldconfig.service. Dec 13 14:17:08.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.890321 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:17:08.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.894769 systemd[1]: Starting systemd-update-done.service... Dec 13 14:17:08.914720 systemd[1]: Finished systemd-update-done.service. Dec 13 14:17:08.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:08.955000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:17:08.955000 audit[1799]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb75d930 a2=420 a3=0 items=0 ppid=1773 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.955000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:17:08.957237 augenrules[1799]: No rules Dec 13 14:17:08.958794 systemd[1]: Finished audit-rules.service. Dec 13 14:17:08.960508 systemd-resolved[1776]: Positive Trust Anchors: Dec 13 14:17:08.961186 systemd-resolved[1776]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:17:08.961375 systemd-resolved[1776]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:17:08.978258 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:17:08.980112 systemd[1]: Reached target time-set.target. Dec 13 14:17:09.011389 systemd-resolved[1776]: Defaulting to hostname 'linux'. Dec 13 14:17:09.014446 systemd[1]: Started systemd-resolved.service. Dec 13 14:17:09.016718 systemd[1]: Reached target network.target. Dec 13 14:17:09.018725 systemd[1]: Reached target network-online.target. Dec 13 14:17:09.020451 systemd[1]: Reached target nss-lookup.target. Dec 13 14:17:09.022006 systemd[1]: Reached target sysinit.target. Dec 13 14:17:09.023731 systemd[1]: Started motdgen.path. Dec 13 14:17:09.025437 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:17:09.027781 systemd[1]: Started logrotate.timer. Dec 13 14:17:09.029958 systemd[1]: Started mdadm.timer. Dec 13 14:17:09.031460 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:17:09.033193 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:17:09.033244 systemd[1]: Reached target paths.target. Dec 13 14:17:09.034637 systemd[1]: Reached target timers.target. Dec 13 14:17:09.036970 systemd[1]: Listening on dbus.socket. Dec 13 14:17:09.041271 systemd[1]: Starting docker.socket... Dec 13 14:17:09.047984 systemd[1]: Listening on sshd.socket. Dec 13 14:17:09.049745 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:09.050672 systemd[1]: Listening on docker.socket. Dec 13 14:17:09.052406 systemd[1]: Reached target sockets.target. Dec 13 14:17:09.053972 systemd[1]: Reached target basic.target. Dec 13 14:17:09.055481 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:17:09.055550 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:17:09.057696 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:17:09.062770 systemd[1]: Starting containerd.service... Dec 13 14:17:09.067124 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:17:09.071373 systemd[1]: Starting dbus.service... Dec 13 14:17:09.075310 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:17:09.080023 systemd[1]: Starting extend-filesystems.service... Dec 13 14:17:09.081906 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:17:09.085483 systemd[1]: Starting kubelet.service... Dec 13 14:17:09.090440 systemd[1]: Starting motdgen.service... Dec 13 14:17:09.104089 systemd[1]: Started nvidia.service. Dec 13 14:17:09.108174 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:17:09.113602 systemd[1]: Starting sshd-keygen.service... Dec 13 14:17:09.120063 jq[1811]: false Dec 13 14:17:09.122666 systemd[1]: Starting systemd-logind.service... Dec 13 14:17:09.124249 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:09.124375 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:17:09.125902 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:17:09.127538 systemd[1]: Starting update-engine.service... Dec 13 14:17:09.154386 jq[1822]: true Dec 13 14:17:09.133364 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:17:09.156770 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:17:09.157235 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:17:09.164893 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:17:09.165287 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:17:09.271616 jq[1826]: true Dec 13 14:17:09.327629 extend-filesystems[1812]: Found loop1 Dec 13 14:17:09.337740 extend-filesystems[1812]: Found nvme0n1 Dec 13 14:17:09.341144 extend-filesystems[1812]: Found nvme0n1p1 Dec 13 14:17:09.342736 extend-filesystems[1812]: Found nvme0n1p2 Dec 13 14:17:09.342736 extend-filesystems[1812]: Found nvme0n1p3 Dec 13 14:17:09.345848 extend-filesystems[1812]: Found usr Dec 13 14:17:09.350028 extend-filesystems[1812]: Found nvme0n1p4 Dec 13 14:17:09.351613 extend-filesystems[1812]: Found nvme0n1p6 Dec 13 14:17:09.357132 extend-filesystems[1812]: Found nvme0n1p7 Dec 13 14:17:09.358965 extend-filesystems[1812]: Found nvme0n1p9 Dec 13 14:17:09.361269 extend-filesystems[1812]: Checking size of /dev/nvme0n1p9 Dec 13 14:17:09.375711 dbus-daemon[1810]: [system] SELinux support is enabled Dec 13 14:17:09.391727 systemd[1]: Started dbus.service. Dec 13 14:17:09.396817 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:17:09.396885 systemd[1]: Reached target system-config.target. Dec 13 14:17:09.398706 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:17:09.398753 systemd[1]: Reached target user-config.target. Dec 13 14:17:09.410626 dbus-daemon[1810]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1545 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:17:09.412640 dbus-daemon[1810]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:17:09.417033 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:17:09.417410 systemd[1]: Finished motdgen.service. Dec 13 14:17:09.429093 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:17:09.467963 extend-filesystems[1812]: Resized partition /dev/nvme0n1p9 Dec 13 14:17:09.477535 extend-filesystems[1865]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:17:09.504979 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:17:09.515658 amazon-ssm-agent[1807]: 2024/12/13 14:17:09 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:17:09.534307 amazon-ssm-agent[1807]: Initializing new seelog logger Dec 13 14:17:09.537484 amazon-ssm-agent[1807]: New Seelog Logger Creation Complete Dec 13 14:17:09.540814 update_engine[1821]: I1213 14:17:09.540407 1821 main.cc:92] Flatcar Update Engine starting Dec 13 14:17:09.545205 systemd[1]: Started update-engine.service. Dec 13 14:17:09.545866 amazon-ssm-agent[1807]: 2024/12/13 14:17:09 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:17:09.546910 amazon-ssm-agent[1807]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:17:09.549996 systemd[1]: Started locksmithd.service. Dec 13 14:17:09.551538 amazon-ssm-agent[1807]: 2024/12/13 14:17:09 processing appconfig overrides Dec 13 14:17:09.552432 update_engine[1821]: I1213 14:17:09.552374 1821 update_check_scheduler.cc:74] Next update check in 2m6s Dec 13 14:17:09.585963 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:17:09.612822 bash[1875]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:17:09.613493 extend-filesystems[1865]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:17:09.613493 extend-filesystems[1865]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:17:09.613493 extend-filesystems[1865]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:17:09.620620 extend-filesystems[1812]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:17:09.629747 env[1829]: time="2024-12-13T14:17:09.629676230Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:17:09.634840 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:17:09.635277 systemd[1]: Finished extend-filesystems.service. Dec 13 14:17:09.637699 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:17:09.714984 systemd-logind[1820]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:17:09.715037 systemd-logind[1820]: Watching system buttons on /dev/input/event1 (Sleep Button) Dec 13 14:17:09.723087 systemd-logind[1820]: New seat seat0. Dec 13 14:17:09.723788 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:17:09.731009 systemd[1]: Started systemd-logind.service. Dec 13 14:17:09.845584 env[1829]: time="2024-12-13T14:17:09.845449479Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:17:09.849221 env[1829]: time="2024-12-13T14:17:09.849164259Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:09.852235 env[1829]: time="2024-12-13T14:17:09.852168735Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:17:09.852695 env[1829]: time="2024-12-13T14:17:09.852659175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:09.858214 env[1829]: time="2024-12-13T14:17:09.858152475Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:17:09.861074 env[1829]: time="2024-12-13T14:17:09.861017775Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:09.861816 env[1829]: time="2024-12-13T14:17:09.861766575Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:17:09.867045 env[1829]: time="2024-12-13T14:17:09.866985807Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:09.867879 env[1829]: time="2024-12-13T14:17:09.867428499Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:09.869914 env[1829]: time="2024-12-13T14:17:09.869854095Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:09.874180 env[1829]: time="2024-12-13T14:17:09.874115679Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:17:09.878196 env[1829]: time="2024-12-13T14:17:09.878137863Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:17:09.879648 env[1829]: time="2024-12-13T14:17:09.879186015Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:17:09.879892 env[1829]: time="2024-12-13T14:17:09.879851079Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:17:09.891136 env[1829]: time="2024-12-13T14:17:09.891076539Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:17:09.891360 env[1829]: time="2024-12-13T14:17:09.891326415Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:17:09.891487 env[1829]: time="2024-12-13T14:17:09.891457335Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:17:09.891712 env[1829]: time="2024-12-13T14:17:09.891677283Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.891874 env[1829]: time="2024-12-13T14:17:09.891842247Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.892023 env[1829]: time="2024-12-13T14:17:09.891992115Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.892182 env[1829]: time="2024-12-13T14:17:09.892152183Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.892824 env[1829]: time="2024-12-13T14:17:09.892769691Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.893038 env[1829]: time="2024-12-13T14:17:09.893005575Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.893171 env[1829]: time="2024-12-13T14:17:09.893140827Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.893294 env[1829]: time="2024-12-13T14:17:09.893264367Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.893428 env[1829]: time="2024-12-13T14:17:09.893389575Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:17:09.893765 env[1829]: time="2024-12-13T14:17:09.893733639Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:17:09.894119 env[1829]: time="2024-12-13T14:17:09.894088203Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:17:09.894664 env[1829]: time="2024-12-13T14:17:09.894631179Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:17:09.895219 env[1829]: time="2024-12-13T14:17:09.895178067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.895724 env[1829]: time="2024-12-13T14:17:09.895684971Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:17:09.896002 env[1829]: time="2024-12-13T14:17:09.895968351Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.899808 env[1829]: time="2024-12-13T14:17:09.899752815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.900604 env[1829]: time="2024-12-13T14:17:09.900562395Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.900766 env[1829]: time="2024-12-13T14:17:09.900735279Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.901116 env[1829]: time="2024-12-13T14:17:09.901083135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.901268 env[1829]: time="2024-12-13T14:17:09.901238019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.903516 env[1829]: time="2024-12-13T14:17:09.901369131Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.903753 env[1829]: time="2024-12-13T14:17:09.903689415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.903950 env[1829]: time="2024-12-13T14:17:09.903903591Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:17:09.904761 env[1829]: time="2024-12-13T14:17:09.904711107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.905667 env[1829]: time="2024-12-13T14:17:09.905616039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.906273 env[1829]: time="2024-12-13T14:17:09.906236451Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.906452 env[1829]: time="2024-12-13T14:17:09.906421827Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:17:09.906606 env[1829]: time="2024-12-13T14:17:09.906571755Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:17:09.906722 env[1829]: time="2024-12-13T14:17:09.906693183Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:17:09.906911 env[1829]: time="2024-12-13T14:17:09.906877371Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:17:09.908804 env[1829]: time="2024-12-13T14:17:09.907069791Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:17:09.909427 env[1829]: time="2024-12-13T14:17:09.909326451Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:17:09.910566 env[1829]: time="2024-12-13T14:17:09.909865695Z" level=info msg="Connect containerd service" Dec 13 14:17:09.912628 env[1829]: time="2024-12-13T14:17:09.909964767Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:17:09.916449 env[1829]: time="2024-12-13T14:17:09.916391679Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:17:09.920796 env[1829]: time="2024-12-13T14:17:09.920745015Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:17:09.922700 env[1829]: time="2024-12-13T14:17:09.922649139Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:17:09.924530 env[1829]: time="2024-12-13T14:17:09.924487215Z" level=info msg="containerd successfully booted in 0.320036s" Dec 13 14:17:09.924611 systemd[1]: Started containerd.service. Dec 13 14:17:09.931039 dbus-daemon[1810]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:17:09.931312 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:17:09.932924 dbus-daemon[1810]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1854 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:17:09.938360 systemd[1]: Starting polkit.service... Dec 13 14:17:09.940952 env[1829]: time="2024-12-13T14:17:09.940820931Z" level=info msg="Start subscribing containerd event" Dec 13 14:17:09.941125 env[1829]: time="2024-12-13T14:17:09.941007291Z" level=info msg="Start recovering state" Dec 13 14:17:09.941241 env[1829]: time="2024-12-13T14:17:09.941193699Z" level=info msg="Start event monitor" Dec 13 14:17:09.941323 env[1829]: time="2024-12-13T14:17:09.941272335Z" level=info msg="Start snapshots syncer" Dec 13 14:17:09.941382 env[1829]: time="2024-12-13T14:17:09.941302347Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:17:09.941382 env[1829]: time="2024-12-13T14:17:09.941348895Z" level=info msg="Start streaming server" Dec 13 14:17:09.987714 polkitd[1930]: Started polkitd version 121 Dec 13 14:17:10.009711 polkitd[1930]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:17:10.009836 polkitd[1930]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:17:10.013577 polkitd[1930]: Finished loading, compiling and executing 2 rules Dec 13 14:17:10.014376 dbus-daemon[1810]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:17:10.014667 systemd[1]: Started polkit.service. Dec 13 14:17:10.017332 polkitd[1930]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:17:10.043079 systemd-hostnamed[1854]: Hostname set to (transient) Dec 13 14:17:10.043681 systemd-resolved[1776]: System hostname changed to 'ip-172-31-27-246'. Dec 13 14:17:10.200756 coreos-metadata[1809]: Dec 13 14:17:10.200 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:17:10.207061 coreos-metadata[1809]: Dec 13 14:17:10.206 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:17:10.208326 coreos-metadata[1809]: Dec 13 14:17:10.208 INFO Fetch successful Dec 13 14:17:10.208663 coreos-metadata[1809]: Dec 13 14:17:10.208 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:17:10.211992 coreos-metadata[1809]: Dec 13 14:17:10.211 INFO Fetch successful Dec 13 14:17:10.216642 unknown[1809]: wrote ssh authorized keys file for user: core Dec 13 14:17:10.234477 update-ssh-keys[1967]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:17:10.235202 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:17:10.416063 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Create new startup processor Dec 13 14:17:10.426340 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:17:10.428194 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing bookkeeping folders Dec 13 14:17:10.428365 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO removing the completed state files Dec 13 14:17:10.428481 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:17:10.428602 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:17:10.429025 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing healthcheck folders for long running plugins Dec 13 14:17:10.429161 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing locations for inventory plugin Dec 13 14:17:10.429299 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing default location for custom inventory Dec 13 14:17:10.429412 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing default location for file inventory Dec 13 14:17:10.429523 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Initializing default location for role inventory Dec 13 14:17:10.430990 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Init the cloudwatchlogs publisher Dec 13 14:17:10.431167 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:17:10.431303 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:17:10.431419 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:17:10.431811 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:17:10.431962 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:17:10.432082 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:17:10.432215 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:17:10.433290 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:17:10.433473 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:17:10.433589 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:17:10.433703 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:17:10.434142 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO OS: linux, Arch: arm64 Dec 13 14:17:10.439360 amazon-ssm-agent[1807]: datastore file /var/lib/amazon/ssm/i-015d80e458c1669d9/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:17:10.527257 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:17:10.621730 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:17:10.716070 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:17:10.805662 locksmithd[1883]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:17:10.810639 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:17:10.905360 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:17:11.000282 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [instanceID=i-015d80e458c1669d9] Starting association polling Dec 13 14:17:11.095485 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:17:11.142650 systemd[1]: Started kubelet.service. Dec 13 14:17:11.190764 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:17:11.286276 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:17:11.382169 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:17:11.478027 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:17:11.574143 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:17:11.670505 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:17:11.766914 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:17:11.863629 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:17:11.878405 kubelet[2002]: E1213 14:17:11.869185 2002 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:17:11.882718 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:17:11.883059 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:17:11.883491 systemd[1]: kubelet.service: Consumed 1.414s CPU time. Dec 13 14:17:11.956355 sshd_keygen[1840]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:17:11.960504 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-015d80e458c1669d9, requestId: ec404edf-929d-4115-ad06-8d1b3fcb5338 Dec 13 14:17:11.993115 systemd[1]: Finished sshd-keygen.service. Dec 13 14:17:11.997484 systemd[1]: Starting issuegen.service... Dec 13 14:17:12.008258 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:17:12.008628 systemd[1]: Finished issuegen.service. Dec 13 14:17:12.013347 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:17:12.027517 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:17:12.032016 systemd[1]: Started getty@tty1.service. Dec 13 14:17:12.036456 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:17:12.038614 systemd[1]: Reached target getty.target. Dec 13 14:17:12.040338 systemd[1]: Reached target multi-user.target. Dec 13 14:17:12.044665 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:17:12.058181 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [OfflineService] Starting document processing engine... Dec 13 14:17:12.061814 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:17:12.062207 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:17:12.064380 systemd[1]: Startup finished in 1.130s (kernel) + 8.695s (initrd) + 11.777s (userspace) = 21.603s. Dec 13 14:17:12.155454 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:17:12.253059 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:17:12.350552 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [OfflineService] Starting message polling Dec 13 14:17:12.448412 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [OfflineService] Starting send replies to MDS Dec 13 14:17:12.546505 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:17:12.644677 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:17:12.743126 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] listening reply. Dec 13 14:17:12.841877 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:17:12.940670 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:17:13.039736 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:17:13.139108 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:17:13.238515 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:17:13.338140 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-015d80e458c1669d9?role=subscribe&stream=input Dec 13 14:17:13.438029 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-015d80e458c1669d9?role=subscribe&stream=input Dec 13 14:17:13.538068 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:17:13.638264 amazon-ssm-agent[1807]: 2024-12-13 14:17:10 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:17:17.611369 systemd[1]: Created slice system-sshd.slice. Dec 13 14:17:17.614001 systemd[1]: Started sshd@0-172.31.27.246:22-139.178.89.65:38090.service. Dec 13 14:17:17.864080 sshd[2023]: Accepted publickey for core from 139.178.89.65 port 38090 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:17.869215 sshd[2023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:17.887823 systemd[1]: Created slice user-500.slice. Dec 13 14:17:17.890672 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:17:17.898110 systemd-logind[1820]: New session 1 of user core. Dec 13 14:17:17.913665 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:17:17.917553 systemd[1]: Starting user@500.service... Dec 13 14:17:17.925450 (systemd)[2026]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:18.114360 systemd[2026]: Queued start job for default target default.target. Dec 13 14:17:18.116232 systemd[2026]: Reached target paths.target. Dec 13 14:17:18.116289 systemd[2026]: Reached target sockets.target. Dec 13 14:17:18.116321 systemd[2026]: Reached target timers.target. Dec 13 14:17:18.116351 systemd[2026]: Reached target basic.target. Dec 13 14:17:18.116457 systemd[2026]: Reached target default.target. Dec 13 14:17:18.116524 systemd[2026]: Startup finished in 178ms. Dec 13 14:17:18.117005 systemd[1]: Started user@500.service. Dec 13 14:17:18.120034 systemd[1]: Started session-1.scope. Dec 13 14:17:18.273337 systemd[1]: Started sshd@1-172.31.27.246:22-139.178.89.65:59630.service. Dec 13 14:17:18.452003 sshd[2035]: Accepted publickey for core from 139.178.89.65 port 59630 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:18.454555 sshd[2035]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:18.462664 systemd-logind[1820]: New session 2 of user core. Dec 13 14:17:18.463590 systemd[1]: Started session-2.scope. Dec 13 14:17:18.596907 sshd[2035]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:18.601495 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:17:18.602616 systemd[1]: sshd@1-172.31.27.246:22-139.178.89.65:59630.service: Deactivated successfully. Dec 13 14:17:18.604222 systemd-logind[1820]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:17:18.606619 systemd-logind[1820]: Removed session 2. Dec 13 14:17:18.629019 systemd[1]: Started sshd@2-172.31.27.246:22-139.178.89.65:59646.service. Dec 13 14:17:18.809724 sshd[2041]: Accepted publickey for core from 139.178.89.65 port 59646 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:18.811707 sshd[2041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:18.820038 systemd-logind[1820]: New session 3 of user core. Dec 13 14:17:18.820730 systemd[1]: Started session-3.scope. Dec 13 14:17:18.947111 sshd[2041]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:18.952486 systemd[1]: sshd@2-172.31.27.246:22-139.178.89.65:59646.service: Deactivated successfully. Dec 13 14:17:18.952920 systemd-logind[1820]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:17:18.953650 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:17:18.956086 systemd-logind[1820]: Removed session 3. Dec 13 14:17:18.975351 systemd[1]: Started sshd@3-172.31.27.246:22-139.178.89.65:59650.service. Dec 13 14:17:19.151492 sshd[2047]: Accepted publickey for core from 139.178.89.65 port 59650 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:19.153409 sshd[2047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:19.162002 systemd[1]: Started session-4.scope. Dec 13 14:17:19.164079 systemd-logind[1820]: New session 4 of user core. Dec 13 14:17:19.297087 sshd[2047]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:19.302320 systemd-logind[1820]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:17:19.302920 systemd[1]: sshd@3-172.31.27.246:22-139.178.89.65:59650.service: Deactivated successfully. Dec 13 14:17:19.304219 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:17:19.305925 systemd-logind[1820]: Removed session 4. Dec 13 14:17:19.325036 systemd[1]: Started sshd@4-172.31.27.246:22-139.178.89.65:59666.service. Dec 13 14:17:19.450377 systemd-timesyncd[1778]: Timed out waiting for reply from 23.186.168.1:123 (0.flatcar.pool.ntp.org). Dec 13 14:17:19.488491 systemd-timesyncd[1778]: Contacted time server 173.249.203.72:123 (0.flatcar.pool.ntp.org). Dec 13 14:17:19.488603 systemd-timesyncd[1778]: Initial clock synchronization to Fri 2024-12-13 14:17:19.368984 UTC. Dec 13 14:17:19.498039 sshd[2053]: Accepted publickey for core from 139.178.89.65 port 59666 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:19.500586 sshd[2053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:19.508030 systemd-logind[1820]: New session 5 of user core. Dec 13 14:17:19.509558 systemd[1]: Started session-5.scope. Dec 13 14:17:19.643286 sudo[2056]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:17:19.644303 sudo[2056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:19.678236 dbus-daemon[1810]: avc: received setenforce notice (enforcing=1) Dec 13 14:17:19.680960 sudo[2056]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:19.705436 sshd[2053]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:19.712490 systemd[1]: sshd@4-172.31.27.246:22-139.178.89.65:59666.service: Deactivated successfully. Dec 13 14:17:19.713810 systemd-logind[1820]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:17:19.713962 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:17:19.716204 systemd-logind[1820]: Removed session 5. Dec 13 14:17:19.734013 systemd[1]: Started sshd@5-172.31.27.246:22-139.178.89.65:59672.service. Dec 13 14:17:19.909751 sshd[2060]: Accepted publickey for core from 139.178.89.65 port 59672 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:19.912976 sshd[2060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:19.920031 systemd-logind[1820]: New session 6 of user core. Dec 13 14:17:19.921574 systemd[1]: Started session-6.scope. Dec 13 14:17:20.030496 sudo[2064]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:17:20.032195 sudo[2064]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:20.037807 sudo[2064]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:20.047330 sudo[2063]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:17:20.047866 sudo[2063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:20.066076 systemd[1]: Stopping audit-rules.service... Dec 13 14:17:20.066000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:17:20.069089 kernel: kauditd_printk_skb: 117 callbacks suppressed Dec 13 14:17:20.069155 kernel: audit: type=1305 audit(1734099440.066:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:17:20.069530 auditctl[2067]: No rules Dec 13 14:17:20.070511 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:17:20.070946 systemd[1]: Stopped audit-rules.service. Dec 13 14:17:20.066000 audit[2067]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff197fd0 a2=420 a3=0 items=0 ppid=1 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.084024 kernel: audit: type=1300 audit(1734099440.066:212): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff197fd0 a2=420 a3=0 items=0 ppid=1 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.084106 kernel: audit: type=1327 audit(1734099440.066:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:17:20.066000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:17:20.085654 systemd[1]: Starting audit-rules.service... Dec 13 14:17:20.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.095888 kernel: audit: type=1131 audit(1734099440.068:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.118424 augenrules[2084]: No rules Dec 13 14:17:20.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.121962 sudo[2063]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:20.120068 systemd[1]: Finished audit-rules.service. Dec 13 14:17:20.120000 audit[2063]: USER_END pid=2063 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.136412 kernel: audit: type=1130 audit(1734099440.119:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.136533 kernel: audit: type=1106 audit(1734099440.120:215): pid=2063 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.120000 audit[2063]: CRED_DISP pid=2063 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.143854 kernel: audit: type=1104 audit(1734099440.120:216): pid=2063 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.152091 sshd[2060]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:20.153000 audit[2060]: USER_END pid=2060 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.156884 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:17:20.158011 systemd[1]: sshd@5-172.31.27.246:22-139.178.89.65:59672.service: Deactivated successfully. Dec 13 14:17:20.153000 audit[2060]: CRED_DISP pid=2060 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.174417 kernel: audit: type=1106 audit(1734099440.153:217): pid=2060 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.174570 kernel: audit: type=1104 audit(1734099440.153:218): pid=2060 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.174617 kernel: audit: type=1131 audit(1734099440.153:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.246:22-139.178.89.65:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.246:22-139.178.89.65:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.174816 systemd-logind[1820]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:17:20.180834 systemd[1]: Started sshd@6-172.31.27.246:22-139.178.89.65:59678.service. Dec 13 14:17:20.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.246:22-139.178.89.65:59678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.187621 systemd-logind[1820]: Removed session 6. Dec 13 14:17:20.363000 audit[2090]: USER_ACCT pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.366066 sshd[2090]: Accepted publickey for core from 139.178.89.65 port 59678 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:20.366000 audit[2090]: CRED_ACQ pid=2090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.367000 audit[2090]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed1f2120 a2=3 a3=1 items=0 ppid=1 pid=2090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.367000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:20.369143 sshd[2090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:20.378789 systemd[1]: Started session-7.scope. Dec 13 14:17:20.379728 systemd-logind[1820]: New session 7 of user core. Dec 13 14:17:20.388000 audit[2090]: USER_START pid=2090 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.391000 audit[2092]: CRED_ACQ pid=2092 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:20.487000 audit[2093]: USER_ACCT pid=2093 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.489140 sudo[2093]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:17:20.488000 audit[2093]: CRED_REFR pid=2093 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.489720 sudo[2093]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:20.491000 audit[2093]: USER_START pid=2093 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.514334 systemd[1]: Starting coreos-metadata.service... Dec 13 14:17:20.673229 coreos-metadata[2097]: Dec 13 14:17:20.672 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:17:20.673912 coreos-metadata[2097]: Dec 13 14:17:20.673 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Dec 13 14:17:20.674449 coreos-metadata[2097]: Dec 13 14:17:20.674 INFO Fetch successful Dec 13 14:17:20.674720 coreos-metadata[2097]: Dec 13 14:17:20.674 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Dec 13 14:17:20.675098 coreos-metadata[2097]: Dec 13 14:17:20.674 INFO Fetch successful Dec 13 14:17:20.675392 coreos-metadata[2097]: Dec 13 14:17:20.675 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Dec 13 14:17:20.675686 coreos-metadata[2097]: Dec 13 14:17:20.675 INFO Fetch successful Dec 13 14:17:20.676004 coreos-metadata[2097]: Dec 13 14:17:20.675 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Dec 13 14:17:20.676279 coreos-metadata[2097]: Dec 13 14:17:20.676 INFO Fetch successful Dec 13 14:17:20.676549 coreos-metadata[2097]: Dec 13 14:17:20.676 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Dec 13 14:17:20.676804 coreos-metadata[2097]: Dec 13 14:17:20.676 INFO Fetch successful Dec 13 14:17:20.677101 coreos-metadata[2097]: Dec 13 14:17:20.676 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Dec 13 14:17:20.677397 coreos-metadata[2097]: Dec 13 14:17:20.677 INFO Fetch successful Dec 13 14:17:20.677651 coreos-metadata[2097]: Dec 13 14:17:20.677 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Dec 13 14:17:20.677964 coreos-metadata[2097]: Dec 13 14:17:20.677 INFO Fetch successful Dec 13 14:17:20.678220 coreos-metadata[2097]: Dec 13 14:17:20.678 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Dec 13 14:17:20.678475 coreos-metadata[2097]: Dec 13 14:17:20.678 INFO Fetch successful Dec 13 14:17:20.693359 systemd[1]: Finished coreos-metadata.service. Dec 13 14:17:20.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.790031 amazon-ssm-agent[1807]: 2024-12-13 14:17:20 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:17:21.514622 systemd[1]: Stopped kubelet.service. Dec 13 14:17:21.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.515600 systemd[1]: kubelet.service: Consumed 1.414s CPU time. Dec 13 14:17:21.520684 systemd[1]: Starting kubelet.service... Dec 13 14:17:21.571996 systemd[1]: Reloading. Dec 13 14:17:21.714677 /usr/lib/systemd/system-generators/torcx-generator[2150]: time="2024-12-13T14:17:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:21.714740 /usr/lib/systemd/system-generators/torcx-generator[2150]: time="2024-12-13T14:17:21Z" level=info msg="torcx already run" Dec 13 14:17:21.902835 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:21.903133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:21.945801 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.109000 audit: BPF prog-id=49 op=LOAD Dec 13 14:17:22.109000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:17:22.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.111000 audit: BPF prog-id=50 op=LOAD Dec 13 14:17:22.112000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit: BPF prog-id=51 op=LOAD Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.113000 audit: BPF prog-id=52 op=LOAD Dec 13 14:17:22.114000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:17:22.114000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.117000 audit: BPF prog-id=53 op=LOAD Dec 13 14:17:22.117000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.124000 audit: BPF prog-id=54 op=LOAD Dec 13 14:17:22.124000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:17:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit: BPF prog-id=55 op=LOAD Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.126000 audit: BPF prog-id=56 op=LOAD Dec 13 14:17:22.126000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:17:22.126000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.129000 audit: BPF prog-id=57 op=LOAD Dec 13 14:17:22.129000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:17:22.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.136000 audit: BPF prog-id=58 op=LOAD Dec 13 14:17:22.137000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit: BPF prog-id=59 op=LOAD Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.139000 audit: BPF prog-id=60 op=LOAD Dec 13 14:17:22.139000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:17:22.139000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:17:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.142000 audit: BPF prog-id=61 op=LOAD Dec 13 14:17:22.142000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:17:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit: BPF prog-id=62 op=LOAD Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.144000 audit: BPF prog-id=63 op=LOAD Dec 13 14:17:22.144000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:17:22.144000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit: BPF prog-id=64 op=LOAD Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.146000 audit: BPF prog-id=65 op=LOAD Dec 13 14:17:22.146000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:17:22.146000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:22.147000 audit: BPF prog-id=66 op=LOAD Dec 13 14:17:22.147000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:17:22.186995 systemd[1]: Started kubelet.service. Dec 13 14:17:22.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.190670 systemd[1]: Stopping kubelet.service... Dec 13 14:17:22.193212 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:17:22.193767 systemd[1]: Stopped kubelet.service. Dec 13 14:17:22.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.198296 systemd[1]: Starting kubelet.service... Dec 13 14:17:22.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.616283 systemd[1]: Started kubelet.service. Dec 13 14:17:22.694686 kubelet[2212]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:17:22.694686 kubelet[2212]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:17:22.694686 kubelet[2212]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:17:22.695352 kubelet[2212]: I1213 14:17:22.694830 2212 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:17:23.521620 kubelet[2212]: I1213 14:17:23.521560 2212 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:17:23.521857 kubelet[2212]: I1213 14:17:23.521835 2212 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:17:23.522384 kubelet[2212]: I1213 14:17:23.522359 2212 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:17:23.562365 kubelet[2212]: I1213 14:17:23.562303 2212 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:17:23.577188 kubelet[2212]: E1213 14:17:23.577142 2212 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:17:23.577423 kubelet[2212]: I1213 14:17:23.577399 2212 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:17:23.584150 kubelet[2212]: I1213 14:17:23.584114 2212 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:17:23.585615 kubelet[2212]: I1213 14:17:23.585588 2212 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:17:23.586138 kubelet[2212]: I1213 14:17:23.586089 2212 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:17:23.586506 kubelet[2212]: I1213 14:17:23.586238 2212 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.27.246","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:17:23.586793 kubelet[2212]: I1213 14:17:23.586770 2212 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:17:23.586898 kubelet[2212]: I1213 14:17:23.586878 2212 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:17:23.587232 kubelet[2212]: I1213 14:17:23.587212 2212 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:17:23.601684 kubelet[2212]: I1213 14:17:23.601623 2212 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:17:23.601900 kubelet[2212]: I1213 14:17:23.601852 2212 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:17:23.602119 kubelet[2212]: I1213 14:17:23.602098 2212 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:17:23.602239 kubelet[2212]: I1213 14:17:23.602218 2212 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:17:23.603223 kubelet[2212]: E1213 14:17:23.603170 2212 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:23.603408 kubelet[2212]: E1213 14:17:23.603253 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:23.608082 kubelet[2212]: I1213 14:17:23.608048 2212 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:17:23.611162 kubelet[2212]: I1213 14:17:23.611127 2212 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:17:23.612561 kubelet[2212]: W1213 14:17:23.612529 2212 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:17:23.613889 kubelet[2212]: I1213 14:17:23.613853 2212 server.go:1269] "Started kubelet" Dec 13 14:17:23.615000 audit[2212]: AVC avc: denied { mac_admin } for pid=2212 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:23.615000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:23.615000 audit[2212]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000869e90 a1=40009e25e8 a2=4000869e60 a3=25 items=0 ppid=1 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.615000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:23.617300 kubelet[2212]: I1213 14:17:23.617251 2212 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:17:23.616000 audit[2212]: AVC avc: denied { mac_admin } for pid=2212 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:23.616000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:23.616000 audit[2212]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000460a80 a1=40009e2600 a2=4000869f20 a3=25 items=0 ppid=1 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:23.617892 kubelet[2212]: I1213 14:17:23.617863 2212 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:17:23.618152 kubelet[2212]: I1213 14:17:23.618130 2212 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:17:23.627523 kubelet[2212]: I1213 14:17:23.627450 2212 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:17:23.629130 kubelet[2212]: I1213 14:17:23.629085 2212 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:17:23.630671 kubelet[2212]: I1213 14:17:23.630573 2212 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:17:23.631023 kubelet[2212]: I1213 14:17:23.630989 2212 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:17:23.631386 kubelet[2212]: I1213 14:17:23.631349 2212 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:17:23.631679 kubelet[2212]: I1213 14:17:23.631648 2212 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:17:23.632070 kubelet[2212]: E1213 14:17:23.632033 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:23.632397 kubelet[2212]: I1213 14:17:23.632361 2212 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:17:23.632506 kubelet[2212]: I1213 14:17:23.632481 2212 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:17:23.645382 kubelet[2212]: I1213 14:17:23.645329 2212 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:17:23.645640 kubelet[2212]: I1213 14:17:23.645592 2212 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:17:23.646790 kubelet[2212]: I1213 14:17:23.646745 2212 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:17:23.658782 kubelet[2212]: E1213 14:17:23.658709 2212 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.27.246\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:17:23.659014 kubelet[2212]: W1213 14:17:23.658876 2212 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:17:23.659093 kubelet[2212]: E1213 14:17:23.659043 2212 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Dec 13 14:17:23.675969 kubelet[2212]: E1213 14:17:23.664416 2212 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.27.246.1810c2419dcd895c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.27.246,UID:172.31.27.246,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.27.246,},FirstTimestamp:2024-12-13 14:17:23.6137967 +0000 UTC m=+0.989639466,LastTimestamp:2024-12-13 14:17:23.6137967 +0000 UTC m=+0.989639466,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.27.246,}" Dec 13 14:17:23.676296 kubelet[2212]: W1213 14:17:23.674904 2212 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.27.246" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:17:23.678338 kubelet[2212]: E1213 14:17:23.678279 2212 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.27.246\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:17:23.678338 kubelet[2212]: W1213 14:17:23.675115 2212 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:17:23.678530 kubelet[2212]: E1213 14:17:23.678358 2212 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:17:23.691000 audit[2227]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.691000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd255eea0 a2=0 a3=1 items=0 ppid=2212 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:17:23.694698 kubelet[2212]: I1213 14:17:23.694663 2212 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:17:23.694882 kubelet[2212]: I1213 14:17:23.694859 2212 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:17:23.695463 kubelet[2212]: I1213 14:17:23.695441 2212 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:17:23.696000 audit[2230]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.696000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe203ac80 a2=0 a3=1 items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:17:23.698462 kubelet[2212]: I1213 14:17:23.698434 2212 policy_none.go:49] "None policy: Start" Dec 13 14:17:23.700479 kubelet[2212]: I1213 14:17:23.700449 2212 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:17:23.700693 kubelet[2212]: I1213 14:17:23.700671 2212 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:17:23.715834 systemd[1]: Created slice kubepods.slice. Dec 13 14:17:23.706000 audit[2232]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.706000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdf634810 a2=0 a3=1 items=0 ppid=2212 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:23.733535 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:17:23.735834 kubelet[2212]: E1213 14:17:23.735769 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:23.741013 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:17:23.746826 kubelet[2212]: I1213 14:17:23.746787 2212 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:17:23.746000 audit[2238]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.746000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff3fd22b0 a2=0 a3=1 items=0 ppid=2212 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.747000 audit[2212]: AVC avc: denied { mac_admin } for pid=2212 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:23.747000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:23.747000 audit[2212]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000952120 a1=4000e16a38 a2=40009520f0 a3=25 items=0 ppid=1 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.747000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:23.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:23.751793 kubelet[2212]: I1213 14:17:23.751751 2212 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:17:23.752034 kubelet[2212]: I1213 14:17:23.752007 2212 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:17:23.752107 kubelet[2212]: I1213 14:17:23.752037 2212 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:17:23.752570 kubelet[2212]: I1213 14:17:23.752539 2212 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:17:23.754894 kubelet[2212]: E1213 14:17:23.754857 2212 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.27.246\" not found" Dec 13 14:17:23.823000 audit[2243]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.823000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc3541390 a2=0 a3=1 items=0 ppid=2212 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:17:23.828104 kubelet[2212]: I1213 14:17:23.828054 2212 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:17:23.829000 audit[2244]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:23.829000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff4f088e0 a2=0 a3=1 items=0 ppid=2212 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:17:23.830000 audit[2245]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.830000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf2cd420 a2=0 a3=1 items=0 ppid=2212 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:17:23.832527 kubelet[2212]: I1213 14:17:23.832488 2212 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:17:23.832741 kubelet[2212]: I1213 14:17:23.832719 2212 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:17:23.832891 kubelet[2212]: I1213 14:17:23.832870 2212 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:17:23.833162 kubelet[2212]: E1213 14:17:23.833127 2212 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:17:23.832000 audit[2246]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.832000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc545c3d0 a2=0 a3=1 items=0 ppid=2212 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:17:23.834000 audit[2247]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:23.834000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce2215f0 a2=0 a3=1 items=0 ppid=2212 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:17:23.836000 audit[2248]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:23.836000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe00607f0 a2=0 a3=1 items=0 ppid=2212 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:17:23.838000 audit[2249]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:23.838000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffb4fe2e0 a2=0 a3=1 items=0 ppid=2212 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:17:23.841000 audit[2250]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:23.841000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd7b81890 a2=0 a3=1 items=0 ppid=2212 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:17:23.853714 kubelet[2212]: I1213 14:17:23.853662 2212 kubelet_node_status.go:72] "Attempting to register node" node="172.31.27.246" Dec 13 14:17:23.869306 kubelet[2212]: I1213 14:17:23.869271 2212 kubelet_node_status.go:75] "Successfully registered node" node="172.31.27.246" Dec 13 14:17:23.869524 kubelet[2212]: E1213 14:17:23.869500 2212 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.31.27.246\": node \"172.31.27.246\" not found" Dec 13 14:17:23.916705 kubelet[2212]: E1213 14:17:23.916668 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.017125 kubelet[2212]: E1213 14:17:24.017046 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.118234 kubelet[2212]: E1213 14:17:24.118113 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.218708 kubelet[2212]: E1213 14:17:24.218646 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.319237 kubelet[2212]: E1213 14:17:24.319191 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.419766 kubelet[2212]: E1213 14:17:24.419666 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.520328 kubelet[2212]: E1213 14:17:24.520283 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.536655 kubelet[2212]: I1213 14:17:24.536608 2212 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:17:24.536854 kubelet[2212]: W1213 14:17:24.536809 2212 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:17:24.604459 kubelet[2212]: E1213 14:17:24.604412 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:24.621034 kubelet[2212]: E1213 14:17:24.620971 2212 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.27.246\" not found" Dec 13 14:17:24.722436 kubelet[2212]: I1213 14:17:24.722305 2212 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:17:24.723837 env[1829]: time="2024-12-13T14:17:24.723763706Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:17:24.724427 kubelet[2212]: I1213 14:17:24.724262 2212 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:17:24.740990 sudo[2093]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:24.740000 audit[2093]: USER_END pid=2093 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:24.740000 audit[2093]: CRED_DISP pid=2093 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:24.765096 sshd[2090]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:24.766000 audit[2090]: USER_END pid=2090 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:24.766000 audit[2090]: CRED_DISP pid=2090 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:24.769604 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:17:24.771840 systemd[1]: sshd@6-172.31.27.246:22-139.178.89.65:59678.service: Deactivated successfully. Dec 13 14:17:24.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.246:22-139.178.89.65:59678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:24.772200 systemd-logind[1820]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:17:24.774589 systemd-logind[1820]: Removed session 7. Dec 13 14:17:25.605513 kubelet[2212]: E1213 14:17:25.605443 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:25.605787 kubelet[2212]: I1213 14:17:25.605457 2212 apiserver.go:52] "Watching apiserver" Dec 13 14:17:25.611272 kubelet[2212]: E1213 14:17:25.611210 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:25.622155 systemd[1]: Created slice kubepods-besteffort-pod1efc45b2_fde8_472e_ba89_876f772dd37c.slice. Dec 13 14:17:25.634308 kubelet[2212]: I1213 14:17:25.633517 2212 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:17:25.633840 systemd[1]: Created slice kubepods-besteffort-pod4ff662e7_0bcd_4132_8080_6ef331c1ce90.slice. Dec 13 14:17:25.646407 kubelet[2212]: I1213 14:17:25.646365 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4ff662e7-0bcd-4132-8080-6ef331c1ce90-tigera-ca-bundle\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.647280 kubelet[2212]: I1213 14:17:25.647223 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4ff662e7-0bcd-4132-8080-6ef331c1ce90-node-certs\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.647561 kubelet[2212]: I1213 14:17:25.647501 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/02da707f-4a83-4da6-bd1d-8d8ad7f4aadc-varrun\") pod \"csi-node-driver-9xwl8\" (UID: \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\") " pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:25.647802 kubelet[2212]: I1213 14:17:25.647713 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/02da707f-4a83-4da6-bd1d-8d8ad7f4aadc-kubelet-dir\") pod \"csi-node-driver-9xwl8\" (UID: \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\") " pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:25.648054 kubelet[2212]: I1213 14:17:25.648026 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-czjv5\" (UniqueName: \"kubernetes.io/projected/02da707f-4a83-4da6-bd1d-8d8ad7f4aadc-kube-api-access-czjv5\") pod \"csi-node-driver-9xwl8\" (UID: \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\") " pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:25.648302 kubelet[2212]: I1213 14:17:25.648250 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1efc45b2-fde8-472e-ba89-876f772dd37c-lib-modules\") pod \"kube-proxy-z4wdh\" (UID: \"1efc45b2-fde8-472e-ba89-876f772dd37c\") " pod="kube-system/kube-proxy-z4wdh" Dec 13 14:17:25.648493 kubelet[2212]: I1213 14:17:25.648443 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jsjvr\" (UniqueName: \"kubernetes.io/projected/1efc45b2-fde8-472e-ba89-876f772dd37c-kube-api-access-jsjvr\") pod \"kube-proxy-z4wdh\" (UID: \"1efc45b2-fde8-472e-ba89-876f772dd37c\") " pod="kube-system/kube-proxy-z4wdh" Dec 13 14:17:25.648684 kubelet[2212]: I1213 14:17:25.648659 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-xtables-lock\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.648866 kubelet[2212]: I1213 14:17:25.648841 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-flexvol-driver-host\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.649091 kubelet[2212]: I1213 14:17:25.649066 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxgkt\" (UniqueName: \"kubernetes.io/projected/4ff662e7-0bcd-4132-8080-6ef331c1ce90-kube-api-access-kxgkt\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.649317 kubelet[2212]: I1213 14:17:25.649282 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-policysync\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.649492 kubelet[2212]: I1213 14:17:25.649468 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-cni-bin-dir\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.649673 kubelet[2212]: I1213 14:17:25.649649 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-cni-log-dir\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.649846 kubelet[2212]: I1213 14:17:25.649822 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-var-lib-calico\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.650044 kubelet[2212]: I1213 14:17:25.650020 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/02da707f-4a83-4da6-bd1d-8d8ad7f4aadc-registration-dir\") pod \"csi-node-driver-9xwl8\" (UID: \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\") " pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:25.650236 kubelet[2212]: I1213 14:17:25.650212 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1efc45b2-fde8-472e-ba89-876f772dd37c-kube-proxy\") pod \"kube-proxy-z4wdh\" (UID: \"1efc45b2-fde8-472e-ba89-876f772dd37c\") " pod="kube-system/kube-proxy-z4wdh" Dec 13 14:17:25.650408 kubelet[2212]: I1213 14:17:25.650384 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-lib-modules\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.650586 kubelet[2212]: I1213 14:17:25.650561 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-var-run-calico\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.650762 kubelet[2212]: I1213 14:17:25.650738 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1efc45b2-fde8-472e-ba89-876f772dd37c-xtables-lock\") pod \"kube-proxy-z4wdh\" (UID: \"1efc45b2-fde8-472e-ba89-876f772dd37c\") " pod="kube-system/kube-proxy-z4wdh" Dec 13 14:17:25.651026 kubelet[2212]: I1213 14:17:25.650997 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4ff662e7-0bcd-4132-8080-6ef331c1ce90-cni-net-dir\") pod \"calico-node-ggqzv\" (UID: \"4ff662e7-0bcd-4132-8080-6ef331c1ce90\") " pod="calico-system/calico-node-ggqzv" Dec 13 14:17:25.651258 kubelet[2212]: I1213 14:17:25.651233 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/02da707f-4a83-4da6-bd1d-8d8ad7f4aadc-socket-dir\") pod \"csi-node-driver-9xwl8\" (UID: \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\") " pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:25.758676 kubelet[2212]: I1213 14:17:25.758618 2212 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.767086 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.769459 kubelet[2212]: W1213 14:17:25.767127 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.767171 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.767565 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.769459 kubelet[2212]: W1213 14:17:25.767580 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.767699 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.767886 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.769459 kubelet[2212]: W1213 14:17:25.767900 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.768038 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.769459 kubelet[2212]: E1213 14:17:25.768216 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.770374 kubelet[2212]: W1213 14:17:25.768230 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.770374 kubelet[2212]: E1213 14:17:25.768348 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.770374 kubelet[2212]: E1213 14:17:25.768534 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.770374 kubelet[2212]: W1213 14:17:25.768548 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.770374 kubelet[2212]: E1213 14:17:25.768572 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.770374 kubelet[2212]: E1213 14:17:25.768971 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.770374 kubelet[2212]: W1213 14:17:25.768990 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.770374 kubelet[2212]: E1213 14:17:25.769019 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.770374 kubelet[2212]: E1213 14:17:25.769330 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.770374 kubelet[2212]: W1213 14:17:25.769353 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.770978 kubelet[2212]: E1213 14:17:25.769380 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.770978 kubelet[2212]: E1213 14:17:25.770638 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.770978 kubelet[2212]: W1213 14:17:25.770664 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.786960 kubelet[2212]: E1213 14:17:25.778594 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.786960 kubelet[2212]: W1213 14:17:25.778635 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.786960 kubelet[2212]: E1213 14:17:25.778670 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.786960 kubelet[2212]: E1213 14:17:25.779173 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.786960 kubelet[2212]: W1213 14:17:25.779192 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.786960 kubelet[2212]: E1213 14:17:25.779215 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.791159 kubelet[2212]: E1213 14:17:25.790138 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.791159 kubelet[2212]: E1213 14:17:25.790806 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.791159 kubelet[2212]: W1213 14:17:25.790828 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.791430 kubelet[2212]: E1213 14:17:25.791198 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.791430 kubelet[2212]: W1213 14:17:25.791215 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.794453 kubelet[2212]: E1213 14:17:25.794021 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.794453 kubelet[2212]: W1213 14:17:25.794087 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.794702 kubelet[2212]: E1213 14:17:25.794671 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.794857 kubelet[2212]: E1213 14:17:25.794833 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.795347 kubelet[2212]: E1213 14:17:25.795306 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.795733 kubelet[2212]: E1213 14:17:25.795710 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.795856 kubelet[2212]: W1213 14:17:25.795831 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.796068 kubelet[2212]: E1213 14:17:25.796043 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.798353 kubelet[2212]: E1213 14:17:25.798322 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.798565 kubelet[2212]: W1213 14:17:25.798536 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.798708 kubelet[2212]: E1213 14:17:25.798683 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.822766 kubelet[2212]: E1213 14:17:25.822706 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:25.822766 kubelet[2212]: W1213 14:17:25.822743 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:25.823024 kubelet[2212]: E1213 14:17:25.822774 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:25.940503 env[1829]: time="2024-12-13T14:17:25.933178367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z4wdh,Uid:1efc45b2-fde8-472e-ba89-876f772dd37c,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:25.944896 env[1829]: time="2024-12-13T14:17:25.944844820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ggqzv,Uid:4ff662e7-0bcd-4132-8080-6ef331c1ce90,Namespace:calico-system,Attempt:0,}" Dec 13 14:17:26.530021 env[1829]: time="2024-12-13T14:17:26.529962734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.539969 env[1829]: time="2024-12-13T14:17:26.539874245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.543820 env[1829]: time="2024-12-13T14:17:26.543769546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.547377 env[1829]: time="2024-12-13T14:17:26.547320928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.548824 env[1829]: time="2024-12-13T14:17:26.548783703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.552896 env[1829]: time="2024-12-13T14:17:26.552817666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.554362 env[1829]: time="2024-12-13T14:17:26.554307701Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.559054 env[1829]: time="2024-12-13T14:17:26.559001635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.595785 env[1829]: time="2024-12-13T14:17:26.595613687Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:26.596040 env[1829]: time="2024-12-13T14:17:26.595823879Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:26.596115 env[1829]: time="2024-12-13T14:17:26.596016489Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:26.596667 env[1829]: time="2024-12-13T14:17:26.596520776Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:26.596846 env[1829]: time="2024-12-13T14:17:26.596777396Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194 pid=2288 runtime=io.containerd.runc.v2 Dec 13 14:17:26.597207 env[1829]: time="2024-12-13T14:17:26.597127680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:26.597401 env[1829]: time="2024-12-13T14:17:26.597320481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:26.597844 env[1829]: time="2024-12-13T14:17:26.597757959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a205edd0c76171b26233693fb52d27ba60ee5d2f3fedcfec5948d1ac7f405701 pid=2289 runtime=io.containerd.runc.v2 Dec 13 14:17:26.606994 kubelet[2212]: E1213 14:17:26.606858 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:26.621877 systemd[1]: Started cri-containerd-a205edd0c76171b26233693fb52d27ba60ee5d2f3fedcfec5948d1ac7f405701.scope. Dec 13 14:17:26.652096 systemd[1]: Started cri-containerd-68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194.scope. Dec 13 14:17:26.676362 kernel: kauditd_printk_skb: 276 callbacks suppressed Dec 13 14:17:26.676508 kernel: audit: type=1400 audit(1734099446.666:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.684027 kernel: audit: type=1400 audit(1734099446.666:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.691910 kernel: audit: type=1400 audit(1734099446.666:463): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.699772 kernel: audit: type=1400 audit(1734099446.666:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717510 kernel: audit: type=1400 audit(1734099446.666:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717621 kernel: audit: type=1400 audit(1734099446.666:466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.724976 kernel: audit: type=1400 audit(1734099446.666:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.733108 kernel: audit: type=1400 audit(1734099446.666:468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.740522 kernel: audit: type=1400 audit(1734099446.666:469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.669000 audit: BPF prog-id=67 op=LOAD Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=2289 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303565646430633736313731623236323333363933666235326432 Dec 13 14:17:26.748986 kernel: audit: type=1400 audit(1734099446.669:470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2289 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303565646430633736313731623236323333363933666235326432 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.676000 audit: BPF prog-id=68 op=LOAD Dec 13 14:17:26.676000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2289 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303565646430633736313731623236323333363933666235326432 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.682000 audit: BPF prog-id=69 op=LOAD Dec 13 14:17:26.682000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2289 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303565646430633736313731623236323333363933666235326432 Dec 13 14:17:26.696000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:17:26.696000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.696000 audit: BPF prog-id=70 op=LOAD Dec 13 14:17:26.696000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2289 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303565646430633736313731623236323333363933666235326432 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.724000 audit: BPF prog-id=71 op=LOAD Dec 13 14:17:26.740000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.740000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2288 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653632663830623138653661643039636532306536396563393633 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2288 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653632663830623138653661643039636532306536396563393633 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit: BPF prog-id=72 op=LOAD Dec 13 14:17:26.748000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2288 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653632663830623138653661643039636532306536396563393633 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.748000 audit: BPF prog-id=73 op=LOAD Dec 13 14:17:26.748000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2288 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653632663830623138653661643039636532306536396563393633 Dec 13 14:17:26.748000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:17:26.749000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.749000 audit: BPF prog-id=74 op=LOAD Dec 13 14:17:26.749000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2288 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638653632663830623138653661643039636532306536396563393633 Dec 13 14:17:26.776257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3608722827.mount: Deactivated successfully. Dec 13 14:17:26.783555 env[1829]: time="2024-12-13T14:17:26.783402137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z4wdh,Uid:1efc45b2-fde8-472e-ba89-876f772dd37c,Namespace:kube-system,Attempt:0,} returns sandbox id \"a205edd0c76171b26233693fb52d27ba60ee5d2f3fedcfec5948d1ac7f405701\"" Dec 13 14:17:26.793790 env[1829]: time="2024-12-13T14:17:26.793738825Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:17:26.805492 env[1829]: time="2024-12-13T14:17:26.805426457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ggqzv,Uid:4ff662e7-0bcd-4132-8080-6ef331c1ce90,Namespace:calico-system,Attempt:0,} returns sandbox id \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\"" Dec 13 14:17:26.834088 kubelet[2212]: E1213 14:17:26.833883 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:27.608171 kubelet[2212]: E1213 14:17:27.608114 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:28.158284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2975067748.mount: Deactivated successfully. Dec 13 14:17:28.608424 kubelet[2212]: E1213 14:17:28.608254 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:28.834073 kubelet[2212]: E1213 14:17:28.833518 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:29.045613 env[1829]: time="2024-12-13T14:17:29.045443607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:29.048908 env[1829]: time="2024-12-13T14:17:29.048836068Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:29.052292 env[1829]: time="2024-12-13T14:17:29.052220549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:29.056033 env[1829]: time="2024-12-13T14:17:29.055966140Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:29.057160 env[1829]: time="2024-12-13T14:17:29.057089932Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a\"" Dec 13 14:17:29.061819 env[1829]: time="2024-12-13T14:17:29.061282049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:17:29.063997 env[1829]: time="2024-12-13T14:17:29.063911661Z" level=info msg="CreateContainer within sandbox \"a205edd0c76171b26233693fb52d27ba60ee5d2f3fedcfec5948d1ac7f405701\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:17:29.094139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3124085855.mount: Deactivated successfully. Dec 13 14:17:29.106096 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3242284670.mount: Deactivated successfully. Dec 13 14:17:29.117690 env[1829]: time="2024-12-13T14:17:29.117603882Z" level=info msg="CreateContainer within sandbox \"a205edd0c76171b26233693fb52d27ba60ee5d2f3fedcfec5948d1ac7f405701\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4bc82ef725dbf1834af49b7adbd2e7b8904482701999e75fe87c56473ab3ab2b\"" Dec 13 14:17:29.119245 env[1829]: time="2024-12-13T14:17:29.119194556Z" level=info msg="StartContainer for \"4bc82ef725dbf1834af49b7adbd2e7b8904482701999e75fe87c56473ab3ab2b\"" Dec 13 14:17:29.150301 systemd[1]: Started cri-containerd-4bc82ef725dbf1834af49b7adbd2e7b8904482701999e75fe87c56473ab3ab2b.scope. Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2289 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462633832656637323564626631383334616634396237616462643265 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.194000 audit: BPF prog-id=75 op=LOAD Dec 13 14:17:29.194000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2289 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462633832656637323564626631383334616634396237616462643265 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.195000 audit: BPF prog-id=76 op=LOAD Dec 13 14:17:29.195000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2289 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462633832656637323564626631383334616634396237616462643265 Dec 13 14:17:29.197000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:17:29.197000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:29.197000 audit: BPF prog-id=77 op=LOAD Dec 13 14:17:29.197000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2289 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462633832656637323564626631383334616634396237616462643265 Dec 13 14:17:29.225439 env[1829]: time="2024-12-13T14:17:29.225308065Z" level=info msg="StartContainer for \"4bc82ef725dbf1834af49b7adbd2e7b8904482701999e75fe87c56473ab3ab2b\" returns successfully" Dec 13 14:17:29.412000 audit[2423]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.412000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec5b87d0 a2=0 a3=1 items=0 ppid=2374 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:17:29.419000 audit[2422]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.419000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe04043b0 a2=0 a3=1 items=0 ppid=2374 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:17:29.422000 audit[2425]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.422000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf6276d0 a2=0 a3=1 items=0 ppid=2374 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:17:29.424000 audit[2426]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.424000 audit[2426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9385aa0 a2=0 a3=1 items=0 ppid=2374 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:17:29.425000 audit[2428]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.425000 audit[2428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffecbe3ef0 a2=0 a3=1 items=0 ppid=2374 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:17:29.427000 audit[2429]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.427000 audit[2429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfb61e60 a2=0 a3=1 items=0 ppid=2374 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:17:29.518000 audit[2430]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.518000 audit[2430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc9f02300 a2=0 a3=1 items=0 ppid=2374 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:17:29.524000 audit[2432]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.524000 audit[2432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffda23b8f0 a2=0 a3=1 items=0 ppid=2374 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:17:29.530000 audit[2435]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.530000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdaf6d670 a2=0 a3=1 items=0 ppid=2374 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:17:29.533000 audit[2436]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.533000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe19cb800 a2=0 a3=1 items=0 ppid=2374 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:17:29.538000 audit[2438]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.538000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2d21b50 a2=0 a3=1 items=0 ppid=2374 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:17:29.540000 audit[2439]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.540000 audit[2439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb3f65a0 a2=0 a3=1 items=0 ppid=2374 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:17:29.545000 audit[2441]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.545000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc210c950 a2=0 a3=1 items=0 ppid=2374 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:17:29.552000 audit[2444]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.552000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe26f9370 a2=0 a3=1 items=0 ppid=2374 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:17:29.554000 audit[2445]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.554000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffc16310 a2=0 a3=1 items=0 ppid=2374 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:17:29.559000 audit[2447]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.559000 audit[2447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd7b05530 a2=0 a3=1 items=0 ppid=2374 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:17:29.562000 audit[2448]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.562000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc385510 a2=0 a3=1 items=0 ppid=2374 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:17:29.567000 audit[2450]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.567000 audit[2450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffffcca1f0 a2=0 a3=1 items=0 ppid=2374 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:17:29.575000 audit[2453]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.575000 audit[2453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec5b7f00 a2=0 a3=1 items=0 ppid=2374 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:17:29.584000 audit[2456]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.584000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0fe7000 a2=0 a3=1 items=0 ppid=2374 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:17:29.586000 audit[2457]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.586000 audit[2457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffec49750 a2=0 a3=1 items=0 ppid=2374 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:17:29.609269 kubelet[2212]: E1213 14:17:29.609196 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:29.590000 audit[2459]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.590000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe1fd2020 a2=0 a3=1 items=0 ppid=2374 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:29.630000 audit[2463]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.630000 audit[2463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffd402b40 a2=0 a3=1 items=0 ppid=2374 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:29.634000 audit[2464]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.634000 audit[2464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbb30b50 a2=0 a3=1 items=0 ppid=2374 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:17:29.640000 audit[2466]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:29.640000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffee311940 a2=0 a3=1 items=0 ppid=2374 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:17:29.682000 audit[2472]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:29.682000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffeedec500 a2=0 a3=1 items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:29.717000 audit[2472]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:29.717000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=ffffeedec500 a2=0 a3=1 items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:29.738000 audit[2482]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.738000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdba743f0 a2=0 a3=1 items=0 ppid=2374 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:17:29.743000 audit[2484]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.743000 audit[2484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff7531150 a2=0 a3=1 items=0 ppid=2374 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:17:29.750000 audit[2487]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.750000 audit[2487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff3ba61a0 a2=0 a3=1 items=0 ppid=2374 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:17:29.753000 audit[2488]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.753000 audit[2488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff40e39e0 a2=0 a3=1 items=0 ppid=2374 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:17:29.757000 audit[2490]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.757000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc8098290 a2=0 a3=1 items=0 ppid=2374 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:17:29.760000 audit[2491]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.760000 audit[2491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4a33760 a2=0 a3=1 items=0 ppid=2374 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:17:29.766000 audit[2493]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.766000 audit[2493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe68aa6e0 a2=0 a3=1 items=0 ppid=2374 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:17:29.773000 audit[2496]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.773000 audit[2496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcb45ca70 a2=0 a3=1 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:17:29.776000 audit[2497]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.776000 audit[2497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3316300 a2=0 a3=1 items=0 ppid=2374 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:17:29.783000 audit[2499]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.783000 audit[2499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd50f7070 a2=0 a3=1 items=0 ppid=2374 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:17:29.785000 audit[2500]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.785000 audit[2500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfaa0120 a2=0 a3=1 items=0 ppid=2374 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:17:29.791000 audit[2502]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.791000 audit[2502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8d70a20 a2=0 a3=1 items=0 ppid=2374 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:17:29.798000 audit[2505]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.798000 audit[2505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdad71110 a2=0 a3=1 items=0 ppid=2374 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:17:29.806000 audit[2508]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.806000 audit[2508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe682e8f0 a2=0 a3=1 items=0 ppid=2374 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:17:29.809000 audit[2509]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.809000 audit[2509]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe196a230 a2=0 a3=1 items=0 ppid=2374 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:17:29.814000 audit[2511]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.814000 audit[2511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc5dfb300 a2=0 a3=1 items=0 ppid=2374 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:29.822000 audit[2514]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2514 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.822000 audit[2514]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd1ef0930 a2=0 a3=1 items=0 ppid=2374 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:29.825000 audit[2515]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.825000 audit[2515]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8b26af0 a2=0 a3=1 items=0 ppid=2374 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:17:29.831000 audit[2517]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2517 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.831000 audit[2517]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff5faa970 a2=0 a3=1 items=0 ppid=2374 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:17:29.837000 audit[2518]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2518 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.837000 audit[2518]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe89609b0 a2=0 a3=1 items=0 ppid=2374 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:17:29.842000 audit[2520]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2520 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.842000 audit[2520]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd1599580 a2=0 a3=1 items=0 ppid=2374 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:29.847000 audit[2523]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:29.847000 audit[2523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffa293840 a2=0 a3=1 items=0 ppid=2374 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.847000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:29.857000 audit[2525]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2525 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:17:29.857000 audit[2525]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe425e9d0 a2=0 a3=1 items=0 ppid=2374 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.857000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:29.860000 audit[2525]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2525 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:17:29.860000 audit[2525]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe425e9d0 a2=0 a3=1 items=0 ppid=2374 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:29.860000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:29.866432 kubelet[2212]: E1213 14:17:29.866153 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.866432 kubelet[2212]: W1213 14:17:29.866205 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.866432 kubelet[2212]: E1213 14:17:29.866234 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.867174 kubelet[2212]: E1213 14:17:29.866852 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.867174 kubelet[2212]: W1213 14:17:29.866875 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.867174 kubelet[2212]: E1213 14:17:29.866923 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.867812 kubelet[2212]: E1213 14:17:29.867517 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.867812 kubelet[2212]: W1213 14:17:29.867562 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.867812 kubelet[2212]: E1213 14:17:29.867586 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.868443 kubelet[2212]: E1213 14:17:29.868141 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.868443 kubelet[2212]: W1213 14:17:29.868187 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.868443 kubelet[2212]: E1213 14:17:29.868212 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.869146 kubelet[2212]: E1213 14:17:29.868845 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.869146 kubelet[2212]: W1213 14:17:29.868891 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.869146 kubelet[2212]: E1213 14:17:29.868915 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.869690 kubelet[2212]: E1213 14:17:29.869447 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.869690 kubelet[2212]: W1213 14:17:29.869467 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.869690 kubelet[2212]: E1213 14:17:29.869513 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.870234 kubelet[2212]: E1213 14:17:29.870048 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.870234 kubelet[2212]: W1213 14:17:29.870068 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.870234 kubelet[2212]: E1213 14:17:29.870090 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.870733 kubelet[2212]: E1213 14:17:29.870546 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.870733 kubelet[2212]: W1213 14:17:29.870566 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.870733 kubelet[2212]: E1213 14:17:29.870586 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.871252 kubelet[2212]: E1213 14:17:29.871054 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.871252 kubelet[2212]: W1213 14:17:29.871074 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.871252 kubelet[2212]: E1213 14:17:29.871095 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.871696 kubelet[2212]: E1213 14:17:29.871523 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.871696 kubelet[2212]: W1213 14:17:29.871542 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.871696 kubelet[2212]: E1213 14:17:29.871562 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.872266 kubelet[2212]: E1213 14:17:29.872065 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.872266 kubelet[2212]: W1213 14:17:29.872086 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.872266 kubelet[2212]: E1213 14:17:29.872112 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.872778 kubelet[2212]: E1213 14:17:29.872574 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.872778 kubelet[2212]: W1213 14:17:29.872594 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.872778 kubelet[2212]: E1213 14:17:29.872615 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.873296 kubelet[2212]: E1213 14:17:29.873112 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.873296 kubelet[2212]: W1213 14:17:29.873132 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.873296 kubelet[2212]: E1213 14:17:29.873152 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.873711 kubelet[2212]: E1213 14:17:29.873599 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.873711 kubelet[2212]: W1213 14:17:29.873621 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.873711 kubelet[2212]: E1213 14:17:29.873643 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.874293 kubelet[2212]: E1213 14:17:29.874263 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.874385 kubelet[2212]: W1213 14:17:29.874291 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.874385 kubelet[2212]: E1213 14:17:29.874321 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.874691 kubelet[2212]: E1213 14:17:29.874663 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.874774 kubelet[2212]: W1213 14:17:29.874691 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.874774 kubelet[2212]: E1213 14:17:29.874717 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.875135 kubelet[2212]: E1213 14:17:29.875108 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.875240 kubelet[2212]: W1213 14:17:29.875135 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.875240 kubelet[2212]: E1213 14:17:29.875159 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.875476 kubelet[2212]: E1213 14:17:29.875451 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.875547 kubelet[2212]: W1213 14:17:29.875478 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.875547 kubelet[2212]: E1213 14:17:29.875500 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.875819 kubelet[2212]: E1213 14:17:29.875793 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.875890 kubelet[2212]: W1213 14:17:29.875825 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.875890 kubelet[2212]: E1213 14:17:29.875849 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.876205 kubelet[2212]: E1213 14:17:29.876179 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.876276 kubelet[2212]: W1213 14:17:29.876204 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.876276 kubelet[2212]: E1213 14:17:29.876226 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.879677 kubelet[2212]: E1213 14:17:29.878873 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.879677 kubelet[2212]: W1213 14:17:29.878904 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.879677 kubelet[2212]: E1213 14:17:29.878965 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.879677 kubelet[2212]: E1213 14:17:29.879374 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.879677 kubelet[2212]: W1213 14:17:29.879396 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.879677 kubelet[2212]: E1213 14:17:29.879420 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.880180 kubelet[2212]: E1213 14:17:29.879833 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.880180 kubelet[2212]: W1213 14:17:29.879854 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.880180 kubelet[2212]: E1213 14:17:29.879887 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.880339 kubelet[2212]: E1213 14:17:29.880295 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.880339 kubelet[2212]: W1213 14:17:29.880316 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.880456 kubelet[2212]: E1213 14:17:29.880345 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.880712 kubelet[2212]: E1213 14:17:29.880667 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.880712 kubelet[2212]: W1213 14:17:29.880699 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.880862 kubelet[2212]: E1213 14:17:29.880737 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.881163 kubelet[2212]: E1213 14:17:29.881137 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.881275 kubelet[2212]: W1213 14:17:29.881163 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.881356 kubelet[2212]: E1213 14:17:29.881316 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.881974 kubelet[2212]: E1213 14:17:29.881897 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.881974 kubelet[2212]: W1213 14:17:29.881964 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.882139 kubelet[2212]: E1213 14:17:29.882006 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.882361 kubelet[2212]: E1213 14:17:29.882335 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.882473 kubelet[2212]: W1213 14:17:29.882364 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.882473 kubelet[2212]: E1213 14:17:29.882394 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.882766 kubelet[2212]: E1213 14:17:29.882740 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.882837 kubelet[2212]: W1213 14:17:29.882765 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.882837 kubelet[2212]: E1213 14:17:29.882793 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.883217 kubelet[2212]: E1213 14:17:29.883176 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.883217 kubelet[2212]: W1213 14:17:29.883206 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.884132 kubelet[2212]: E1213 14:17:29.883395 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.884132 kubelet[2212]: E1213 14:17:29.883491 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.884132 kubelet[2212]: W1213 14:17:29.883506 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.884132 kubelet[2212]: E1213 14:17:29.883526 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:29.885471 kubelet[2212]: E1213 14:17:29.885361 2212 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:17:29.885471 kubelet[2212]: W1213 14:17:29.885387 2212 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:17:29.885471 kubelet[2212]: E1213 14:17:29.885415 2212 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:17:30.435852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3200153338.mount: Deactivated successfully. Dec 13 14:17:30.610307 kubelet[2212]: E1213 14:17:30.610254 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:30.647946 env[1829]: time="2024-12-13T14:17:30.647848519Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.651381 env[1829]: time="2024-12-13T14:17:30.651312300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.654649 env[1829]: time="2024-12-13T14:17:30.654602094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.660598 env[1829]: time="2024-12-13T14:17:30.660548082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.661882 env[1829]: time="2024-12-13T14:17:30.661202648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:17:30.666324 env[1829]: time="2024-12-13T14:17:30.666269653Z" level=info msg="CreateContainer within sandbox \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:17:30.692504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount236713430.mount: Deactivated successfully. Dec 13 14:17:30.700523 env[1829]: time="2024-12-13T14:17:30.700454747Z" level=info msg="CreateContainer within sandbox \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2\"" Dec 13 14:17:30.701663 env[1829]: time="2024-12-13T14:17:30.701604320Z" level=info msg="StartContainer for \"03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2\"" Dec 13 14:17:30.740457 systemd[1]: Started cri-containerd-03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2.scope. Dec 13 14:17:30.776000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.776000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2288 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:30.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643931653134393834363961323363616562393164363539373563 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.777000 audit: BPF prog-id=78 op=LOAD Dec 13 14:17:30.777000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2288 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:30.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643931653134393834363961323363616562393164363539373563 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.778000 audit: BPF prog-id=79 op=LOAD Dec 13 14:17:30.778000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2288 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:30.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643931653134393834363961323363616562393164363539373563 Dec 13 14:17:30.780000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:17:30.780000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:30.780000 audit: BPF prog-id=80 op=LOAD Dec 13 14:17:30.780000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2288 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:30.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643931653134393834363961323363616562393164363539373563 Dec 13 14:17:30.811656 env[1829]: time="2024-12-13T14:17:30.811574761Z" level=info msg="StartContainer for \"03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2\" returns successfully" Dec 13 14:17:30.832465 systemd[1]: cri-containerd-03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2.scope: Deactivated successfully. Dec 13 14:17:30.833778 kubelet[2212]: E1213 14:17:30.833689 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:30.834000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:17:30.912464 kubelet[2212]: I1213 14:17:30.912303 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-z4wdh" podStartSLOduration=5.644513798 podStartE2EDuration="7.912282574s" podCreationTimestamp="2024-12-13 14:17:23 +0000 UTC" firstStartedPulling="2024-12-13 14:17:26.792516935 +0000 UTC m=+4.168359701" lastFinishedPulling="2024-12-13 14:17:29.060285723 +0000 UTC m=+6.436128477" observedRunningTime="2024-12-13 14:17:29.879638701 +0000 UTC m=+7.255481503" watchObservedRunningTime="2024-12-13 14:17:30.912282574 +0000 UTC m=+8.288125339" Dec 13 14:17:31.351084 env[1829]: time="2024-12-13T14:17:31.351022118Z" level=info msg="shim disconnected" id=03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2 Dec 13 14:17:31.351406 env[1829]: time="2024-12-13T14:17:31.351370622Z" level=warning msg="cleaning up after shim disconnected" id=03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2 namespace=k8s.io Dec 13 14:17:31.351539 env[1829]: time="2024-12-13T14:17:31.351510911Z" level=info msg="cleaning up dead shim" Dec 13 14:17:31.361524 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-03d91e1498469a23caeb91d65975c7c45740fceaca72c6dd9a762f47b5d001f2-rootfs.mount: Deactivated successfully. Dec 13 14:17:31.369110 env[1829]: time="2024-12-13T14:17:31.369033282Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:17:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2609 runtime=io.containerd.runc.v2\n" Dec 13 14:17:31.612010 kubelet[2212]: E1213 14:17:31.611297 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:31.867620 env[1829]: time="2024-12-13T14:17:31.867197963Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:17:32.612272 kubelet[2212]: E1213 14:17:32.612209 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:32.833472 kubelet[2212]: E1213 14:17:32.833410 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:33.613300 kubelet[2212]: E1213 14:17:33.613202 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:34.613600 kubelet[2212]: E1213 14:17:34.613545 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:34.834391 kubelet[2212]: E1213 14:17:34.834329 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:35.614631 kubelet[2212]: E1213 14:17:35.614578 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:36.615465 kubelet[2212]: E1213 14:17:36.615418 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:36.834007 kubelet[2212]: E1213 14:17:36.833430 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:36.973673 env[1829]: time="2024-12-13T14:17:36.973127530Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.976714 env[1829]: time="2024-12-13T14:17:36.976648206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.979570 env[1829]: time="2024-12-13T14:17:36.979521663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.983258 env[1829]: time="2024-12-13T14:17:36.982405302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.983899 env[1829]: time="2024-12-13T14:17:36.983840455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:17:36.989236 env[1829]: time="2024-12-13T14:17:36.989160898Z" level=info msg="CreateContainer within sandbox \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:17:37.018829 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1612945302.mount: Deactivated successfully. Dec 13 14:17:37.024724 env[1829]: time="2024-12-13T14:17:37.024664451Z" level=info msg="CreateContainer within sandbox \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d\"" Dec 13 14:17:37.025924 env[1829]: time="2024-12-13T14:17:37.025836351Z" level=info msg="StartContainer for \"73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d\"" Dec 13 14:17:37.064347 systemd[1]: Started cri-containerd-73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d.scope. Dec 13 14:17:37.074888 systemd[1]: run-containerd-runc-k8s.io-73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d-runc.ppMtOs.mount: Deactivated successfully. Dec 13 14:17:37.119237 kernel: kauditd_printk_skb: 344 callbacks suppressed Dec 13 14:17:37.119402 kernel: audit: type=1400 audit(1734099457.108:561): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.108000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.108000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2288 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:37.130848 kernel: audit: type=1300 audit(1734099457.108:561): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2288 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:37.130961 kernel: audit: type=1327 audit(1734099457.108:561): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623932316464313539616635313730343434616437663263373931 Dec 13 14:17:37.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623932316464313539616635313730343434616437663263373931 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.147036 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.156698 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.166001 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.176563 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.176718 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.191645 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.200104 kernel: audit: type=1400 audit(1734099457.117:562): avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.117000 audit: BPF prog-id=81 op=LOAD Dec 13 14:17:37.117000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2288 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:37.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623932316464313539616635313730343434616437663263373931 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit: BPF prog-id=82 op=LOAD Dec 13 14:17:37.118000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2288 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:37.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623932316464313539616635313730343434616437663263373931 Dec 13 14:17:37.118000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:17:37.118000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:37.118000 audit: BPF prog-id=83 op=LOAD Dec 13 14:17:37.118000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2288 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:37.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623932316464313539616635313730343434616437663263373931 Dec 13 14:17:37.206207 env[1829]: time="2024-12-13T14:17:37.206116460Z" level=info msg="StartContainer for \"73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d\" returns successfully" Dec 13 14:17:37.616587 kubelet[2212]: E1213 14:17:37.616530 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:38.440296 env[1829]: time="2024-12-13T14:17:38.440210114Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:17:38.445115 systemd[1]: cri-containerd-73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d.scope: Deactivated successfully. Dec 13 14:17:38.445557 systemd[1]: cri-containerd-73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d.scope: Consumed 1.001s CPU time. Dec 13 14:17:38.447000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:17:38.483350 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d-rootfs.mount: Deactivated successfully. Dec 13 14:17:38.493790 kubelet[2212]: I1213 14:17:38.493745 2212 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:17:38.618105 kubelet[2212]: E1213 14:17:38.618033 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:38.846303 systemd[1]: Created slice kubepods-besteffort-pod02da707f_4a83_4da6_bd1d_8d8ad7f4aadc.slice. Dec 13 14:17:38.852793 env[1829]: time="2024-12-13T14:17:38.852713389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xwl8,Uid:02da707f-4a83-4da6-bd1d-8d8ad7f4aadc,Namespace:calico-system,Attempt:0,}" Dec 13 14:17:39.180738 env[1829]: time="2024-12-13T14:17:39.176162455Z" level=error msg="Failed to destroy network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:39.180738 env[1829]: time="2024-12-13T14:17:39.180149021Z" level=error msg="encountered an error cleaning up failed sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:39.180738 env[1829]: time="2024-12-13T14:17:39.180246621Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xwl8,Uid:02da707f-4a83-4da6-bd1d-8d8ad7f4aadc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:39.179301 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d-shm.mount: Deactivated successfully. Dec 13 14:17:39.182327 kubelet[2212]: E1213 14:17:39.181176 2212 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:39.182327 kubelet[2212]: E1213 14:17:39.181262 2212 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:39.182327 kubelet[2212]: E1213 14:17:39.181298 2212 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9xwl8" Dec 13 14:17:39.182557 kubelet[2212]: E1213 14:17:39.181362 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9xwl8_calico-system(02da707f-4a83-4da6-bd1d-8d8ad7f4aadc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9xwl8_calico-system(02da707f-4a83-4da6-bd1d-8d8ad7f4aadc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:39.201541 env[1829]: time="2024-12-13T14:17:39.201479757Z" level=info msg="shim disconnected" id=73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d Dec 13 14:17:39.201887 env[1829]: time="2024-12-13T14:17:39.201841982Z" level=warning msg="cleaning up after shim disconnected" id=73b921dd159af5170444ad7f2c7913291fc797fad76da9f066f3e59d08caf81d namespace=k8s.io Dec 13 14:17:39.202061 env[1829]: time="2024-12-13T14:17:39.202031982Z" level=info msg="cleaning up dead shim" Dec 13 14:17:39.216670 env[1829]: time="2024-12-13T14:17:39.216613606Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:17:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2702 runtime=io.containerd.runc.v2\n" Dec 13 14:17:39.618897 kubelet[2212]: E1213 14:17:39.618848 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:39.888467 env[1829]: time="2024-12-13T14:17:39.888322400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:17:39.889980 kubelet[2212]: I1213 14:17:39.889916 2212 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:17:39.891871 env[1829]: time="2024-12-13T14:17:39.891804769Z" level=info msg="StopPodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\"" Dec 13 14:17:39.938914 env[1829]: time="2024-12-13T14:17:39.938806307Z" level=error msg="StopPodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" failed" error="failed to destroy network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:39.939750 kubelet[2212]: E1213 14:17:39.939367 2212 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:17:39.939750 kubelet[2212]: E1213 14:17:39.939482 2212 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d"} Dec 13 14:17:39.939750 kubelet[2212]: E1213 14:17:39.939632 2212 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:39.939750 kubelet[2212]: E1213 14:17:39.939677 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9xwl8" podUID="02da707f-4a83-4da6-bd1d-8d8ad7f4aadc" Dec 13 14:17:40.063970 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:17:40.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:40.081000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:17:40.081000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:17:40.081000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:17:40.619469 kubelet[2212]: E1213 14:17:40.619399 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:41.619955 kubelet[2212]: E1213 14:17:41.619873 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:42.620433 kubelet[2212]: E1213 14:17:42.620364 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:42.738293 systemd[1]: Created slice kubepods-besteffort-pod4706c355_3971_4222_9ce7_1af030650670.slice. Dec 13 14:17:42.776154 kubelet[2212]: I1213 14:17:42.776057 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7289x\" (UniqueName: \"kubernetes.io/projected/4706c355-3971-4222-9ce7-1af030650670-kube-api-access-7289x\") pod \"nginx-deployment-8587fbcb89-blkd8\" (UID: \"4706c355-3971-4222-9ce7-1af030650670\") " pod="default/nginx-deployment-8587fbcb89-blkd8" Dec 13 14:17:43.045673 env[1829]: time="2024-12-13T14:17:43.045532999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-blkd8,Uid:4706c355-3971-4222-9ce7-1af030650670,Namespace:default,Attempt:0,}" Dec 13 14:17:43.207793 env[1829]: time="2024-12-13T14:17:43.207674584Z" level=error msg="Failed to destroy network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:43.210903 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2-shm.mount: Deactivated successfully. Dec 13 14:17:43.212719 env[1829]: time="2024-12-13T14:17:43.212624496Z" level=error msg="encountered an error cleaning up failed sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:43.212859 env[1829]: time="2024-12-13T14:17:43.212734364Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-blkd8,Uid:4706c355-3971-4222-9ce7-1af030650670,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:43.213316 kubelet[2212]: E1213 14:17:43.213252 2212 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:43.213455 kubelet[2212]: E1213 14:17:43.213339 2212 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-blkd8" Dec 13 14:17:43.213455 kubelet[2212]: E1213 14:17:43.213375 2212 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-blkd8" Dec 13 14:17:43.213598 kubelet[2212]: E1213 14:17:43.213451 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-blkd8_default(4706c355-3971-4222-9ce7-1af030650670)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-blkd8_default(4706c355-3971-4222-9ce7-1af030650670)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-blkd8" podUID="4706c355-3971-4222-9ce7-1af030650670" Dec 13 14:17:43.602843 kubelet[2212]: E1213 14:17:43.602746 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:43.621479 kubelet[2212]: E1213 14:17:43.621414 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:43.911340 kubelet[2212]: I1213 14:17:43.910876 2212 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:17:43.912592 env[1829]: time="2024-12-13T14:17:43.912516235Z" level=info msg="StopPodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\"" Dec 13 14:17:43.977518 env[1829]: time="2024-12-13T14:17:43.977425333Z" level=error msg="StopPodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" failed" error="failed to destroy network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:43.977841 kubelet[2212]: E1213 14:17:43.977759 2212 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:17:43.977999 kubelet[2212]: E1213 14:17:43.977844 2212 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2"} Dec 13 14:17:43.977999 kubelet[2212]: E1213 14:17:43.977906 2212 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4706c355-3971-4222-9ce7-1af030650670\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:43.977999 kubelet[2212]: E1213 14:17:43.977980 2212 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4706c355-3971-4222-9ce7-1af030650670\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-blkd8" podUID="4706c355-3971-4222-9ce7-1af030650670" Dec 13 14:17:44.622251 kubelet[2212]: E1213 14:17:44.622187 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:45.623156 kubelet[2212]: E1213 14:17:45.623089 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:46.623480 kubelet[2212]: E1213 14:17:46.623410 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:47.623810 kubelet[2212]: E1213 14:17:47.623731 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:48.143700 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3928930208.mount: Deactivated successfully. Dec 13 14:17:48.224363 env[1829]: time="2024-12-13T14:17:48.224286819Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:48.227669 env[1829]: time="2024-12-13T14:17:48.227617270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:48.229921 env[1829]: time="2024-12-13T14:17:48.229856264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:48.232771 env[1829]: time="2024-12-13T14:17:48.232687775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:48.234036 env[1829]: time="2024-12-13T14:17:48.233960032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:17:48.261472 env[1829]: time="2024-12-13T14:17:48.261393714Z" level=info msg="CreateContainer within sandbox \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:17:48.285401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount577675946.mount: Deactivated successfully. Dec 13 14:17:48.292201 env[1829]: time="2024-12-13T14:17:48.292096705Z" level=info msg="CreateContainer within sandbox \"68e62f80b18e6ad09ce20e69ec96309f5d5d411d859f4bc999e67d7295ec2194\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d\"" Dec 13 14:17:48.293460 env[1829]: time="2024-12-13T14:17:48.293404733Z" level=info msg="StartContainer for \"5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d\"" Dec 13 14:17:48.325641 systemd[1]: Started cri-containerd-5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d.scope. Dec 13 14:17:48.371000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374778 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 14:17:48.374889 kernel: audit: type=1400 audit(1734099468.371:572): avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.371000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2288 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.392075 kernel: audit: type=1300 audit(1734099468.371:572): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2288 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.392194 kernel: audit: type=1327 audit(1734099468.371:572): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343265386437646465376665323965633362393966313133343364 Dec 13 14:17:48.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343265386437646465376665323965633362393966313133343364 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.409174 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.418372 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.425450 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.433387 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.440839 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.448217 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.458003 kernel: audit: type=1400 audit(1734099468.372:573): avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.372000 audit: BPF prog-id=84 op=LOAD Dec 13 14:17:48.372000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2288 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343265386437646465376665323965633362393966313133343364 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.374000 audit: BPF prog-id=85 op=LOAD Dec 13 14:17:48.374000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2288 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343265386437646465376665323965633362393966313133343364 Dec 13 14:17:48.381000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:17:48.381000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:48.381000 audit: BPF prog-id=86 op=LOAD Dec 13 14:17:48.381000 audit[2802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2288 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343265386437646465376665323965633362393966313133343364 Dec 13 14:17:48.467615 env[1829]: time="2024-12-13T14:17:48.467541742Z" level=info msg="StartContainer for \"5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d\" returns successfully" Dec 13 14:17:48.582827 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:17:48.583051 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:17:48.624710 kubelet[2212]: E1213 14:17:48.624647 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:49.625400 kubelet[2212]: E1213 14:17:49.625337 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:50.136000 audit[2905]: AVC avc: denied { write } for pid=2905 comm="tee" name="fd" dev="proc" ino=15008 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.136000 audit[2905]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa1b6a10 a2=241 a3=1b6 items=1 ppid=2874 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.136000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:17:50.136000 audit: PATH item=0 name="/dev/fd/63" inode=15924 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.136000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.142000 audit[2898]: AVC avc: denied { write } for pid=2898 comm="tee" name="fd" dev="proc" ino=15013 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.142000 audit[2898]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed74aa1f a2=241 a3=1b6 items=1 ppid=2868 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.142000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:17:50.142000 audit: PATH item=0 name="/dev/fd/63" inode=15004 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.142000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.149000 audit[2896]: AVC avc: denied { write } for pid=2896 comm="tee" name="fd" dev="proc" ino=15936 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.149000 audit[2896]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5e04a1f a2=241 a3=1b6 items=1 ppid=2866 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.149000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:17:50.149000 audit: PATH item=0 name="/dev/fd/63" inode=15003 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.156000 audit[2912]: AVC avc: denied { write } for pid=2912 comm="tee" name="fd" dev="proc" ino=15024 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.156000 audit[2912]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6b88a0f a2=241 a3=1b6 items=1 ppid=2869 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.156000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:17:50.156000 audit: PATH item=0 name="/dev/fd/63" inode=15925 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.158000 audit[2910]: AVC avc: denied { write } for pid=2910 comm="tee" name="fd" dev="proc" ino=15028 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.158000 audit[2910]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff89ffa21 a2=241 a3=1b6 items=1 ppid=2875 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.158000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:17:50.158000 audit: PATH item=0 name="/dev/fd/63" inode=15005 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.173000 audit[2934]: AVC avc: denied { write } for pid=2934 comm="tee" name="fd" dev="proc" ino=15940 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.173000 audit[2934]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce54ba20 a2=241 a3=1b6 items=1 ppid=2876 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.175000 audit[2938]: AVC avc: denied { write } for pid=2938 comm="tee" name="fd" dev="proc" ino=15034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:50.175000 audit[2938]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef7c6a1f a2=241 a3=1b6 items=1 ppid=2881 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.175000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:17:50.175000 audit: PATH item=0 name="/dev/fd/63" inode=15027 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.175000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.173000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:17:50.173000 audit: PATH item=0 name="/dev/fd/63" inode=15017 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:50.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.480000 audit: BPF prog-id=87 op=LOAD Dec 13 14:17:50.480000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc10f4148 a2=98 a3=ffffc10f4138 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.480000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.483000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit: BPF prog-id=88 op=LOAD Dec 13 14:17:50.483000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc10f3dd8 a2=74 a3=95 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.483000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.483000 audit: BPF prog-id=89 op=LOAD Dec 13 14:17:50.483000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc10f3e38 a2=94 a3=2 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.484000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:17:50.587924 kubelet[2212]: I1213 14:17:50.587855 2212 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:50.628536 kubelet[2212]: E1213 14:17:50.628486 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:50.636979 systemd[1]: run-containerd-runc-k8s.io-5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d-runc.8FZcrk.mount: Deactivated successfully. Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.681000 audit: BPF prog-id=90 op=LOAD Dec 13 14:17:50.681000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc10f3df8 a2=40 a3=ffffc10f3e28 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.683000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:17:50.683000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.683000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc10f3f10 a2=50 a3=0 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.683000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.699000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.699000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc10f3e68 a2=28 a3=ffffc10f3f98 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.699000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.700000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.700000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc10f3e98 a2=28 a3=ffffc10f3fc8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.700000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.700000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.700000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc10f3d48 a2=28 a3=ffffc10f3e78 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.700000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.701000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.701000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc10f3eb8 a2=28 a3=ffffc10f3fe8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.701000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.701000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.701000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc10f3e98 a2=28 a3=ffffc10f3fc8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.701000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.702000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.702000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc10f3e88 a2=28 a3=ffffc10f3fb8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.702000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.703000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.703000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc10f3eb8 a2=28 a3=ffffc10f3fe8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.703000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.704000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.704000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc10f3e98 a2=28 a3=ffffc10f3fc8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.704000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.704000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc10f3eb8 a2=28 a3=ffffc10f3fe8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.704000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.704000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc10f3e88 a2=28 a3=ffffc10f3fb8 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.705000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.705000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc10f3f08 a2=28 a3=ffffc10f4048 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc10f3c40 a2=50 a3=0 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.706000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.706000 audit: BPF prog-id=91 op=LOAD Dec 13 14:17:50.706000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc10f3c48 a2=94 a3=5 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.706000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.707000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc10f3d50 a2=50 a3=0 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.708000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc10f3e98 a2=4 a3=3 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.708000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.708000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:50.708000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc10f3e78 a2=94 a3=6 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.708000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.711000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:50.711000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc10f3648 a2=94 a3=83 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.711000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.713000 audit[2973]: AVC avc: denied { confidentiality } for pid=2973 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:50.713000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc10f3648 a2=94 a3=83 items=0 ppid=2867 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.713000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit: BPF prog-id=92 op=LOAD Dec 13 14:17:50.734000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffede997e8 a2=98 a3=ffffede997d8 items=0 ppid=2867 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.734000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:50.734000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit: BPF prog-id=93 op=LOAD Dec 13 14:17:50.734000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffede99698 a2=74 a3=95 items=0 ppid=2867 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.734000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:50.734000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.734000 audit: BPF prog-id=94 op=LOAD Dec 13 14:17:50.734000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffede996c8 a2=40 a3=ffffede996f8 items=0 ppid=2867 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.734000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:50.734000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:17:50.797248 systemd[1]: run-containerd-runc-k8s.io-5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d-runc.vDiWTK.mount: Deactivated successfully. Dec 13 14:17:50.830552 amazon-ssm-agent[1807]: 2024-12-13 14:17:50 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:17:50.902458 (udev-worker)[2834]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:50.911553 systemd-networkd[1545]: vxlan.calico: Link UP Dec 13 14:17:50.911577 systemd-networkd[1545]: vxlan.calico: Gained carrier Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.957000 audit: BPF prog-id=95 op=LOAD Dec 13 14:17:50.957000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcef4b238 a2=98 a3=ffffcef4b228 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.958000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit: BPF prog-id=96 op=LOAD Dec 13 14:17:50.958000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcef4af18 a2=74 a3=95 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.958000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.958000 audit: BPF prog-id=97 op=LOAD Dec 13 14:17:50.958000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcef4af78 a2=94 a3=2 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcef4afa8 a2=28 a3=ffffcef4b0d8 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcef4afd8 a2=28 a3=ffffcef4b108 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcef4ae88 a2=28 a3=ffffcef4afb8 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcef4aff8 a2=28 a3=ffffcef4b128 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcef4afd8 a2=28 a3=ffffcef4b108 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcef4afc8 a2=28 a3=ffffcef4b0f8 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcef4aff8 a2=28 a3=ffffcef4b128 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcef4afd8 a2=28 a3=ffffcef4b108 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcef4aff8 a2=28 a3=ffffcef4b128 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcef4afc8 a2=28 a3=ffffcef4b0f8 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcef4b048 a2=28 a3=ffffcef4b188 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.959000 audit: BPF prog-id=98 op=LOAD Dec 13 14:17:50.959000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcef4ae68 a2=40 a3=ffffcef4ae98 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.960000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcef4ae90 a2=50 a3=0 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcef4ae90 a2=50 a3=0 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit: BPF prog-id=99 op=LOAD Dec 13 14:17:50.961000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcef4a5f8 a2=94 a3=2 items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.961000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.961000 audit: BPF prog-id=100 op=LOAD Dec 13 14:17:50.961000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcef4a788 a2=94 a3=2d items=0 ppid=2867 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:50.960588 (udev-worker)[3042]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.974000 audit: BPF prog-id=101 op=LOAD Dec 13 14:17:50.974000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa66cca8 a2=98 a3=fffffa66cc98 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:50.974000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit: BPF prog-id=102 op=LOAD Dec 13 14:17:50.975000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffa66c938 a2=74 a3=95 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:50.975000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:50.975000 audit: BPF prog-id=103 op=LOAD Dec 13 14:17:50.975000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffa66c998 a2=94 a3=2 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:50.975000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.154000 audit: BPF prog-id=104 op=LOAD Dec 13 14:17:51.154000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffa66c958 a2=40 a3=fffffa66c988 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.154000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.155000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:17:51.155000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.155000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffa66ca70 a2=50 a3=0 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.155000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.173000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.173000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffa66c9c8 a2=28 a3=fffffa66caf8 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.173000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.173000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa66c9f8 a2=28 a3=fffffa66cb28 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.173000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.173000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa66c8a8 a2=28 a3=fffffa66c9d8 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.174000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.174000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffa66ca18 a2=28 a3=fffffa66cb48 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.174000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.174000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffa66c9f8 a2=28 a3=fffffa66cb28 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.175000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.175000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffa66c9e8 a2=28 a3=fffffa66cb18 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.175000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.175000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffa66ca18 a2=28 a3=fffffa66cb48 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.175000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.175000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa66c9f8 a2=28 a3=fffffa66cb28 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.176000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.176000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa66ca18 a2=28 a3=fffffa66cb48 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.176000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.176000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa66c9e8 a2=28 a3=fffffa66cb18 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.176000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.176000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffa66ca68 a2=28 a3=fffffa66cba8 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffa66c7a0 a2=50 a3=0 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.177000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.177000 audit: BPF prog-id=105 op=LOAD Dec 13 14:17:51.177000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa66c7a8 a2=94 a3=5 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.177000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.178000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:17:51.178000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.178000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffa66c8b0 a2=50 a3=0 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.178000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffa66c9f8 a2=4 a3=3 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.179000 audit[3053]: AVC avc: denied { confidentiality } for pid=3053 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:51.179000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffa66c9d8 a2=94 a3=6 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.181000 audit[3053]: AVC avc: denied { confidentiality } for pid=3053 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:51.181000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffa66c1a8 a2=94 a3=83 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { perfmon } for pid=3053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.182000 audit[3053]: AVC avc: denied { confidentiality } for pid=3053 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:51.182000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffa66c1a8 a2=94 a3=83 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.182000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.184000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.184000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffa66dbe8 a2=10 a3=fffffa66dcd8 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.184000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.185000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.185000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffa66daa8 a2=10 a3=fffffa66db98 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.185000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.185000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffa66da18 a2=10 a3=fffffa66db98 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.186000 audit[3053]: AVC avc: denied { bpf } for pid=3053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.186000 audit[3053]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffa66da18 a2=10 a3=fffffa66db98 items=0 ppid=2867 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:51.195000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:17:51.285000 audit[3078]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:51.285000 audit[3078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe5d99d10 a2=0 a3=ffff991d7fa8 items=0 ppid=2867 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.285000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:51.306000 audit[3079]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:51.306000 audit[3079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff28e3d60 a2=0 a3=ffffb5843fa8 items=0 ppid=2867 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.306000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:51.308000 audit[3080]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:51.308000 audit[3080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc8af7000 a2=0 a3=ffff8f739fa8 items=0 ppid=2867 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:51.311000 audit[3077]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:51.311000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffcf6340f0 a2=0 a3=ffff95cd6fa8 items=0 ppid=2867 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.311000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:51.628976 kubelet[2212]: E1213 14:17:51.628902 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:52.380272 systemd-networkd[1545]: vxlan.calico: Gained IPv6LL Dec 13 14:17:52.629402 kubelet[2212]: E1213 14:17:52.629328 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:53.630219 kubelet[2212]: E1213 14:17:53.630151 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:53.836556 env[1829]: time="2024-12-13T14:17:53.834797234Z" level=info msg="StopPodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\"" Dec 13 14:17:53.928483 kubelet[2212]: I1213 14:17:53.927506 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ggqzv" podStartSLOduration=9.500027001 podStartE2EDuration="30.927483384s" podCreationTimestamp="2024-12-13 14:17:23 +0000 UTC" firstStartedPulling="2024-12-13 14:17:26.808254896 +0000 UTC m=+4.184097662" lastFinishedPulling="2024-12-13 14:17:48.235711291 +0000 UTC m=+25.611554045" observedRunningTime="2024-12-13 14:17:48.964518895 +0000 UTC m=+26.340361685" watchObservedRunningTime="2024-12-13 14:17:53.927483384 +0000 UTC m=+31.303326162" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.929 [INFO][3101] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.929 [INFO][3101] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" iface="eth0" netns="/var/run/netns/cni-f63ec12c-97a0-d799-1615-d0187f467263" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.929 [INFO][3101] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" iface="eth0" netns="/var/run/netns/cni-f63ec12c-97a0-d799-1615-d0187f467263" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.929 [INFO][3101] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" iface="eth0" netns="/var/run/netns/cni-f63ec12c-97a0-d799-1615-d0187f467263" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.929 [INFO][3101] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.930 [INFO][3101] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.979 [INFO][3107] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.979 [INFO][3107] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:53.979 [INFO][3107] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:54.007 [WARNING][3107] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:54.007 [INFO][3107] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:54.010 [INFO][3107] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:54.017838 env[1829]: 2024-12-13 14:17:54.015 [INFO][3101] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:17:54.022230 env[1829]: time="2024-12-13T14:17:54.022168670Z" level=info msg="TearDown network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" successfully" Dec 13 14:17:54.022449 env[1829]: time="2024-12-13T14:17:54.022412154Z" level=info msg="StopPodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" returns successfully" Dec 13 14:17:54.023887 env[1829]: time="2024-12-13T14:17:54.023804253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xwl8,Uid:02da707f-4a83-4da6-bd1d-8d8ad7f4aadc,Namespace:calico-system,Attempt:1,}" Dec 13 14:17:54.025420 systemd[1]: run-netns-cni\x2df63ec12c\x2d97a0\x2dd799\x2d1615\x2dd0187f467263.mount: Deactivated successfully. Dec 13 14:17:54.358793 systemd-networkd[1545]: calid69608f398b: Link UP Dec 13 14:17:54.365675 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:54.365838 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid69608f398b: link becomes ready Dec 13 14:17:54.366381 systemd-networkd[1545]: calid69608f398b: Gained carrier Dec 13 14:17:54.366699 (udev-worker)[3131]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.218 [INFO][3114] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.27.246-k8s-csi--node--driver--9xwl8-eth0 csi-node-driver- calico-system 02da707f-4a83-4da6-bd1d-8d8ad7f4aadc 1021 0 2024-12-13 14:17:24 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.27.246 csi-node-driver-9xwl8 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid69608f398b [] []}} ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.218 [INFO][3114] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.271 [INFO][3125] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" HandleID="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.287 [INFO][3125] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" HandleID="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400030f750), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.27.246", "pod":"csi-node-driver-9xwl8", "timestamp":"2024-12-13 14:17:54.271679492 +0000 UTC"}, Hostname:"172.31.27.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.287 [INFO][3125] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.287 [INFO][3125] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.287 [INFO][3125] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.27.246' Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.290 [INFO][3125] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.297 [INFO][3125] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.305 [INFO][3125] ipam/ipam.go 489: Trying affinity for 192.168.73.128/26 host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.311 [INFO][3125] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.316 [INFO][3125] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.316 [INFO][3125] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.319 [INFO][3125] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.328 [INFO][3125] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.347 [INFO][3125] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.129/26] block=192.168.73.128/26 handle="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.348 [INFO][3125] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.129/26] handle="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" host="172.31.27.246" Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.348 [INFO][3125] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:54.396120 env[1829]: 2024-12-13 14:17:54.348 [INFO][3125] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.129/26] IPv6=[] ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" HandleID="k8s-pod-network.c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.397390 env[1829]: 2024-12-13 14:17:54.351 [INFO][3114] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-csi--node--driver--9xwl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"", Pod:"csi-node-driver-9xwl8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid69608f398b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:54.397390 env[1829]: 2024-12-13 14:17:54.351 [INFO][3114] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.129/32] ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.397390 env[1829]: 2024-12-13 14:17:54.352 [INFO][3114] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid69608f398b ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.397390 env[1829]: 2024-12-13 14:17:54.368 [INFO][3114] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.397390 env[1829]: 2024-12-13 14:17:54.369 [INFO][3114] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-csi--node--driver--9xwl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d", Pod:"csi-node-driver-9xwl8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid69608f398b", MAC:"ee:c6:03:00:6c:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:54.397390 env[1829]: 2024-12-13 14:17:54.393 [INFO][3114] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d" Namespace="calico-system" Pod="csi-node-driver-9xwl8" WorkloadEndpoint="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:17:54.430102 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 14:17:54.430234 kernel: audit: type=1325 audit(1734099474.421:680): table=filter:69 family=2 entries=34 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:54.421000 audit[3151]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:54.430374 env[1829]: time="2024-12-13T14:17:54.425298471Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:54.430374 env[1829]: time="2024-12-13T14:17:54.425370732Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:54.430374 env[1829]: time="2024-12-13T14:17:54.425396783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:54.430374 env[1829]: time="2024-12-13T14:17:54.425732832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d pid=3154 runtime=io.containerd.runc.v2 Dec 13 14:17:54.421000 audit[3151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffff6e975f0 a2=0 a3=ffffa5a96fa8 items=0 ppid=2867 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.448328 kernel: audit: type=1300 audit(1734099474.421:680): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffff6e975f0 a2=0 a3=ffffa5a96fa8 items=0 ppid=2867 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:54.455883 kernel: audit: type=1327 audit(1734099474.421:680): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:54.462564 update_engine[1821]: I1213 14:17:54.461992 1821 update_attempter.cc:509] Updating boot flags... Dec 13 14:17:54.475487 systemd[1]: Started cri-containerd-c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d.scope. Dec 13 14:17:54.524856 kernel: audit: type=1400 audit(1734099474.510:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.525023 kernel: audit: type=1400 audit(1734099474.510:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.534779 kernel: audit: type=1400 audit(1734099474.510:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.544054 kernel: audit: type=1400 audit(1734099474.510:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.552008 kernel: audit: type=1400 audit(1734099474.510:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.568740 kernel: audit: type=1400 audit(1734099474.510:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.578029 kernel: audit: type=1400 audit(1734099474.510:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.517000 audit: BPF prog-id=106 op=LOAD Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3154 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330613432623435653366393433653237323738343765653435 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3154 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330613432623435653366393433653237323738343765653435 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.518000 audit: BPF prog-id=107 op=LOAD Dec 13 14:17:54.518000 audit[3163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3154 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330613432623435653366393433653237323738343765653435 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit: BPF prog-id=108 op=LOAD Dec 13 14:17:54.524000 audit[3163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3154 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330613432623435653366393433653237323738343765653435 Dec 13 14:17:54.524000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:17:54.524000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:54.524000 audit: BPF prog-id=109 op=LOAD Dec 13 14:17:54.524000 audit[3163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3154 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330613432623435653366393433653237323738343765653435 Dec 13 14:17:54.595686 env[1829]: time="2024-12-13T14:17:54.595611216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xwl8,Uid:02da707f-4a83-4da6-bd1d-8d8ad7f4aadc,Namespace:calico-system,Attempt:1,} returns sandbox id \"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d\"" Dec 13 14:17:54.598513 env[1829]: time="2024-12-13T14:17:54.598440327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:17:54.631207 kubelet[2212]: E1213 14:17:54.631041 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:55.022234 systemd[1]: run-containerd-runc-k8s.io-c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d-runc.mvmy2s.mount: Deactivated successfully. Dec 13 14:17:55.516509 systemd-networkd[1545]: calid69608f398b: Gained IPv6LL Dec 13 14:17:55.632310 kubelet[2212]: E1213 14:17:55.632239 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:56.071223 env[1829]: time="2024-12-13T14:17:56.071145908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:56.074904 env[1829]: time="2024-12-13T14:17:56.074850319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:56.077545 env[1829]: time="2024-12-13T14:17:56.077488321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:56.080209 env[1829]: time="2024-12-13T14:17:56.080146267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:56.080703 env[1829]: time="2024-12-13T14:17:56.080653276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:17:56.087358 env[1829]: time="2024-12-13T14:17:56.087274489Z" level=info msg="CreateContainer within sandbox \"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:17:56.115338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3662253486.mount: Deactivated successfully. Dec 13 14:17:56.122827 env[1829]: time="2024-12-13T14:17:56.122749321Z" level=info msg="CreateContainer within sandbox \"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e03d045f9428d9563e3e0ffe64076fd4178b70114e9e17ce0a2eda1606c6580c\"" Dec 13 14:17:56.123856 env[1829]: time="2024-12-13T14:17:56.123808890Z" level=info msg="StartContainer for \"e03d045f9428d9563e3e0ffe64076fd4178b70114e9e17ce0a2eda1606c6580c\"" Dec 13 14:17:56.177868 systemd[1]: run-containerd-runc-k8s.io-e03d045f9428d9563e3e0ffe64076fd4178b70114e9e17ce0a2eda1606c6580c-runc.18N6U9.mount: Deactivated successfully. Dec 13 14:17:56.185048 systemd[1]: Started cri-containerd-e03d045f9428d9563e3e0ffe64076fd4178b70114e9e17ce0a2eda1606c6580c.scope. Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3154 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:56.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530336430343566393432386439353633653365306666653634303736 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.217000 audit: BPF prog-id=110 op=LOAD Dec 13 14:17:56.217000 audit[3293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3154 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:56.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530336430343566393432386439353633653365306666653634303736 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit: BPF prog-id=111 op=LOAD Dec 13 14:17:56.218000 audit[3293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3154 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:56.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530336430343566393432386439353633653365306666653634303736 Dec 13 14:17:56.218000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:17:56.218000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:56.218000 audit: BPF prog-id=112 op=LOAD Dec 13 14:17:56.218000 audit[3293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3154 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:56.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530336430343566393432386439353633653365306666653634303736 Dec 13 14:17:56.256236 env[1829]: time="2024-12-13T14:17:56.256172086Z" level=info msg="StartContainer for \"e03d045f9428d9563e3e0ffe64076fd4178b70114e9e17ce0a2eda1606c6580c\" returns successfully" Dec 13 14:17:56.258597 env[1829]: time="2024-12-13T14:17:56.258549048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:17:56.632714 kubelet[2212]: E1213 14:17:56.632598 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:57.633442 kubelet[2212]: E1213 14:17:57.633335 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:57.787253 env[1829]: time="2024-12-13T14:17:57.787176005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:57.792286 env[1829]: time="2024-12-13T14:17:57.792226064Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:57.795440 env[1829]: time="2024-12-13T14:17:57.795377188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:57.798220 env[1829]: time="2024-12-13T14:17:57.798159047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:57.799310 env[1829]: time="2024-12-13T14:17:57.799255312Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:17:57.803840 env[1829]: time="2024-12-13T14:17:57.803764079Z" level=info msg="CreateContainer within sandbox \"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:17:57.835543 env[1829]: time="2024-12-13T14:17:57.835467700Z" level=info msg="StopPodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\"" Dec 13 14:17:57.836713 env[1829]: time="2024-12-13T14:17:57.836648251Z" level=info msg="CreateContainer within sandbox \"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"027e8b662391b0fbe480ab8a1789854b314eb50e8181271f70e38ea0a3e30f21\"" Dec 13 14:17:57.838202 env[1829]: time="2024-12-13T14:17:57.838082703Z" level=info msg="StartContainer for \"027e8b662391b0fbe480ab8a1789854b314eb50e8181271f70e38ea0a3e30f21\"" Dec 13 14:17:57.887842 systemd[1]: Started cri-containerd-027e8b662391b0fbe480ab8a1789854b314eb50e8181271f70e38ea0a3e30f21.scope. Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3154 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376538623636323339316230666265343830616238613137383938 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.945000 audit: BPF prog-id=113 op=LOAD Dec 13 14:17:57.945000 audit[3340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3154 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376538623636323339316230666265343830616238613137383938 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.947000 audit: BPF prog-id=114 op=LOAD Dec 13 14:17:57.947000 audit[3340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3154 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376538623636323339316230666265343830616238613137383938 Dec 13 14:17:57.948000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:17:57.949000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.949000 audit: BPF prog-id=115 op=LOAD Dec 13 14:17:57.949000 audit[3340]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3154 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376538623636323339316230666265343830616238613137383938 Dec 13 14:17:57.990454 env[1829]: time="2024-12-13T14:17:57.990383890Z" level=info msg="StartContainer for \"027e8b662391b0fbe480ab8a1789854b314eb50e8181271f70e38ea0a3e30f21\" returns successfully" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:57.978 [INFO][3355] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:57.979 [INFO][3355] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" iface="eth0" netns="/var/run/netns/cni-5ba09508-b2be-4eee-10cf-0422b9cbd66c" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:57.979 [INFO][3355] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" iface="eth0" netns="/var/run/netns/cni-5ba09508-b2be-4eee-10cf-0422b9cbd66c" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:57.979 [INFO][3355] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" iface="eth0" netns="/var/run/netns/cni-5ba09508-b2be-4eee-10cf-0422b9cbd66c" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:57.979 [INFO][3355] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:57.979 [INFO][3355] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.030 [INFO][3378] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.031 [INFO][3378] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.039 [INFO][3378] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.054 [WARNING][3378] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.054 [INFO][3378] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.057 [INFO][3378] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:58.061763 env[1829]: 2024-12-13 14:17:58.059 [INFO][3355] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:17:58.066369 systemd[1]: run-netns-cni\x2d5ba09508\x2db2be\x2d4eee\x2d10cf\x2d0422b9cbd66c.mount: Deactivated successfully. Dec 13 14:17:58.068374 env[1829]: time="2024-12-13T14:17:58.066479772Z" level=info msg="TearDown network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" successfully" Dec 13 14:17:58.068374 env[1829]: time="2024-12-13T14:17:58.066543251Z" level=info msg="StopPodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" returns successfully" Dec 13 14:17:58.069139 env[1829]: time="2024-12-13T14:17:58.069061360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-blkd8,Uid:4706c355-3971-4222-9ce7-1af030650670,Namespace:default,Attempt:1,}" Dec 13 14:17:58.276074 systemd-networkd[1545]: cali596bd37b908: Link UP Dec 13 14:17:58.280998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:58.281250 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali596bd37b908: link becomes ready Dec 13 14:17:58.281705 systemd-networkd[1545]: cali596bd37b908: Gained carrier Dec 13 14:17:58.288420 (udev-worker)[3409]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.145 [INFO][3391] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0 nginx-deployment-8587fbcb89- default 4706c355-3971-4222-9ce7-1af030650670 1042 0 2024-12-13 14:17:42 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.27.246 nginx-deployment-8587fbcb89-blkd8 eth0 default [] [] [kns.default ksa.default.default] cali596bd37b908 [] []}} ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.145 [INFO][3391] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.195 [INFO][3402] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" HandleID="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.214 [INFO][3402] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" HandleID="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003a2150), Attrs:map[string]string{"namespace":"default", "node":"172.31.27.246", "pod":"nginx-deployment-8587fbcb89-blkd8", "timestamp":"2024-12-13 14:17:58.195041887 +0000 UTC"}, Hostname:"172.31.27.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.214 [INFO][3402] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.214 [INFO][3402] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.214 [INFO][3402] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.27.246' Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.219 [INFO][3402] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.226 [INFO][3402] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.234 [INFO][3402] ipam/ipam.go 489: Trying affinity for 192.168.73.128/26 host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.237 [INFO][3402] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.240 [INFO][3402] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.240 [INFO][3402] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.242 [INFO][3402] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.253 [INFO][3402] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.263 [INFO][3402] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.130/26] block=192.168.73.128/26 handle="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.264 [INFO][3402] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.130/26] handle="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" host="172.31.27.246" Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.264 [INFO][3402] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:58.315980 env[1829]: 2024-12-13 14:17:58.264 [INFO][3402] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.130/26] IPv6=[] ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" HandleID="k8s-pod-network.5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.317263 env[1829]: 2024-12-13 14:17:58.267 [INFO][3391] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4706c355-3971-4222-9ce7-1af030650670", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-blkd8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali596bd37b908", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:58.317263 env[1829]: 2024-12-13 14:17:58.267 [INFO][3391] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.130/32] ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.317263 env[1829]: 2024-12-13 14:17:58.267 [INFO][3391] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali596bd37b908 ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.317263 env[1829]: 2024-12-13 14:17:58.283 [INFO][3391] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.317263 env[1829]: 2024-12-13 14:17:58.284 [INFO][3391] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4706c355-3971-4222-9ce7-1af030650670", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc", Pod:"nginx-deployment-8587fbcb89-blkd8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali596bd37b908", MAC:"52:7f:ab:ba:e7:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:58.317263 env[1829]: 2024-12-13 14:17:58.296 [INFO][3391] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc" Namespace="default" Pod="nginx-deployment-8587fbcb89-blkd8" WorkloadEndpoint="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:17:58.325000 audit[3424]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=3424 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:58.325000 audit[3424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffe2a353c0 a2=0 a3=ffffb0aa8fa8 items=0 ppid=2867 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.325000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:58.337555 env[1829]: time="2024-12-13T14:17:58.337186732Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:58.337555 env[1829]: time="2024-12-13T14:17:58.337272001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:58.337555 env[1829]: time="2024-12-13T14:17:58.337299301Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:58.338068 env[1829]: time="2024-12-13T14:17:58.337950308Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc pid=3433 runtime=io.containerd.runc.v2 Dec 13 14:17:58.359126 systemd[1]: Started cri-containerd-5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc.scope. Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.392000 audit: BPF prog-id=116 op=LOAD Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656661383235306664636138633432633538636435306638336236 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656661383235306664636138633432633538636435306638336236 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit: BPF prog-id=117 op=LOAD Dec 13 14:17:58.394000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656661383235306664636138633432633538636435306638336236 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit: BPF prog-id=118 op=LOAD Dec 13 14:17:58.394000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656661383235306664636138633432633538636435306638336236 Dec 13 14:17:58.394000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:17:58.394000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.394000 audit: BPF prog-id=119 op=LOAD Dec 13 14:17:58.394000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656661383235306664636138633432633538636435306638336236 Dec 13 14:17:58.438425 env[1829]: time="2024-12-13T14:17:58.438351877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-blkd8,Uid:4706c355-3971-4222-9ce7-1af030650670,Namespace:default,Attempt:1,} returns sandbox id \"5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc\"" Dec 13 14:17:58.441222 env[1829]: time="2024-12-13T14:17:58.441170314Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:17:58.634204 kubelet[2212]: E1213 14:17:58.634141 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:58.778437 kubelet[2212]: I1213 14:17:58.778335 2212 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:17:58.778825 kubelet[2212]: I1213 14:17:58.778680 2212 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:17:58.839000 audit[3465]: NETFILTER_CFG table=filter:71 family=2 entries=9 op=nft_register_rule pid=3465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.839000 audit[3465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd8ee8c40 a2=0 a3=1 items=0 ppid=2374 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.846000 audit[3465]: NETFILTER_CFG table=nat:72 family=2 entries=27 op=nft_register_chain pid=3465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.846000 audit[3465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd8ee8c40 a2=0 a3=1 items=0 ppid=2374 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.988051 kubelet[2212]: I1213 14:17:58.987857 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9xwl8" podStartSLOduration=31.784521286 podStartE2EDuration="34.987815315s" podCreationTimestamp="2024-12-13 14:17:24 +0000 UTC" firstStartedPulling="2024-12-13 14:17:54.597598362 +0000 UTC m=+31.973441128" lastFinishedPulling="2024-12-13 14:17:57.800892403 +0000 UTC m=+35.176735157" observedRunningTime="2024-12-13 14:17:58.987753313 +0000 UTC m=+36.363596103" watchObservedRunningTime="2024-12-13 14:17:58.987815315 +0000 UTC m=+36.363658105" Dec 13 14:17:59.635410 kubelet[2212]: E1213 14:17:59.635319 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:17:59.676400 systemd-networkd[1545]: cali596bd37b908: Gained IPv6LL Dec 13 14:18:00.122000 audit[3469]: NETFILTER_CFG table=filter:73 family=2 entries=8 op=nft_register_rule pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:00.125322 kernel: kauditd_printk_skb: 202 callbacks suppressed Dec 13 14:18:00.125414 kernel: audit: type=1325 audit(1734099480.122:732): table=filter:73 family=2 entries=8 op=nft_register_rule pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:00.141845 kernel: audit: type=1300 audit(1734099480.122:732): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffcce4630 a2=0 a3=1 items=0 ppid=2374 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.122000 audit[3469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffcce4630 a2=0 a3=1 items=0 ppid=2374 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.150461 kernel: audit: type=1327 audit(1734099480.122:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.143000 audit[3469]: NETFILTER_CFG table=nat:74 family=2 entries=34 op=nft_register_chain pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:00.156235 kernel: audit: type=1325 audit(1734099480.143:733): table=nat:74 family=2 entries=34 op=nft_register_chain pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:00.143000 audit[3469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffcce4630 a2=0 a3=1 items=0 ppid=2374 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.178020 kernel: audit: type=1300 audit(1734099480.143:733): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffcce4630 a2=0 a3=1 items=0 ppid=2374 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.178134 kernel: audit: type=1327 audit(1734099480.143:733): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.635812 kubelet[2212]: E1213 14:18:00.635693 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:01.635981 kubelet[2212]: E1213 14:18:01.635894 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:02.257609 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2441403767.mount: Deactivated successfully. Dec 13 14:18:02.637092 kubelet[2212]: E1213 14:18:02.637018 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:03.602822 kubelet[2212]: E1213 14:18:03.602755 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:03.637739 kubelet[2212]: E1213 14:18:03.637682 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:04.433836 env[1829]: time="2024-12-13T14:18:04.433755744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:04.437656 env[1829]: time="2024-12-13T14:18:04.437584810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:04.449849 env[1829]: time="2024-12-13T14:18:04.449787112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:04.454815 env[1829]: time="2024-12-13T14:18:04.454747984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:04.456493 env[1829]: time="2024-12-13T14:18:04.456443216Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:18:04.461399 env[1829]: time="2024-12-13T14:18:04.461343634Z" level=info msg="CreateContainer within sandbox \"5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:18:04.485589 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1699777867.mount: Deactivated successfully. Dec 13 14:18:04.497327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1396855943.mount: Deactivated successfully. Dec 13 14:18:04.504528 env[1829]: time="2024-12-13T14:18:04.504448821Z" level=info msg="CreateContainer within sandbox \"5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"fad1572d5f9f7ac748084ff64ab1cb533e86eba494c4bc4fd68b2391d9d34dea\"" Dec 13 14:18:04.505541 env[1829]: time="2024-12-13T14:18:04.505470914Z" level=info msg="StartContainer for \"fad1572d5f9f7ac748084ff64ab1cb533e86eba494c4bc4fd68b2391d9d34dea\"" Dec 13 14:18:04.543052 systemd[1]: Started cri-containerd-fad1572d5f9f7ac748084ff64ab1cb533e86eba494c4bc4fd68b2391d9d34dea.scope. Dec 13 14:18:04.580969 kernel: audit: type=1400 audit(1734099484.573:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.581106 kernel: audit: type=1400 audit(1734099484.573:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.595055 kernel: audit: type=1400 audit(1734099484.573:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.602564 kernel: audit: type=1400 audit(1734099484.573:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.580000 audit: BPF prog-id=120 op=LOAD Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3433 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661643135373264356639663761633734383038346666363461623163 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3433 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661643135373264356639663761633734383038346666363461623163 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.587000 audit: BPF prog-id=121 op=LOAD Dec 13 14:18:04.587000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3433 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661643135373264356639663761633734383038346666363461623163 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.593000 audit: BPF prog-id=122 op=LOAD Dec 13 14:18:04.593000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3433 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661643135373264356639663761633734383038346666363461623163 Dec 13 14:18:04.594000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:18:04.594000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.594000 audit: BPF prog-id=123 op=LOAD Dec 13 14:18:04.594000 audit[3487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3433 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661643135373264356639663761633734383038346666363461623163 Dec 13 14:18:04.630201 env[1829]: time="2024-12-13T14:18:04.630138475Z" level=info msg="StartContainer for \"fad1572d5f9f7ac748084ff64ab1cb533e86eba494c4bc4fd68b2391d9d34dea\" returns successfully" Dec 13 14:18:04.638230 kubelet[2212]: E1213 14:18:04.638010 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:05.016744 kubelet[2212]: I1213 14:18:05.016655 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-blkd8" podStartSLOduration=16.998197686 podStartE2EDuration="23.016634323s" podCreationTimestamp="2024-12-13 14:17:42 +0000 UTC" firstStartedPulling="2024-12-13 14:17:58.44056157 +0000 UTC m=+35.816404324" lastFinishedPulling="2024-12-13 14:18:04.458998195 +0000 UTC m=+41.834840961" observedRunningTime="2024-12-13 14:18:05.016434119 +0000 UTC m=+42.392276921" watchObservedRunningTime="2024-12-13 14:18:05.016634323 +0000 UTC m=+42.392477089" Dec 13 14:18:05.638752 kubelet[2212]: E1213 14:18:05.638691 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:06.639374 kubelet[2212]: E1213 14:18:06.639311 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:07.639846 kubelet[2212]: E1213 14:18:07.639781 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:08.640286 kubelet[2212]: E1213 14:18:08.640240 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:09.641219 kubelet[2212]: E1213 14:18:09.641175 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:09.826000 audit[3538]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.829748 kernel: kauditd_printk_skb: 53 callbacks suppressed Dec 13 14:18:09.829860 kernel: audit: type=1325 audit(1734099489.826:752): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.826000 audit[3538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe4ccf3c0 a2=0 a3=1 items=0 ppid=2374 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.846049 kernel: audit: type=1300 audit(1734099489.826:752): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe4ccf3c0 a2=0 a3=1 items=0 ppid=2374 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.851829 kernel: audit: type=1327 audit(1734099489.826:752): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.852022 kernel: audit: type=1325 audit(1734099489.848:753): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.848000 audit[3538]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.848000 audit[3538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4ccf3c0 a2=0 a3=1 items=0 ppid=2374 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.867519 kernel: audit: type=1300 audit(1734099489.848:753): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4ccf3c0 a2=0 a3=1 items=0 ppid=2374 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.867677 kernel: audit: type=1327 audit(1734099489.848:753): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.884000 audit[3540]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.884000 audit[3540]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc8a48400 a2=0 a3=1 items=0 ppid=2374 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.901392 kernel: audit: type=1325 audit(1734099489.884:754): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.901586 kernel: audit: type=1300 audit(1734099489.884:754): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc8a48400 a2=0 a3=1 items=0 ppid=2374 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.907301 kernel: audit: type=1327 audit(1734099489.884:754): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.907448 kernel: audit: type=1325 audit(1734099489.903:755): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.903000 audit[3540]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.903000 audit[3540]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc8a48400 a2=0 a3=1 items=0 ppid=2374 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.922583 systemd[1]: Created slice kubepods-besteffort-poddd89e1fd_6ae7_4030_b252_fbf19e3f687f.slice. Dec 13 14:18:10.039310 kubelet[2212]: I1213 14:18:10.039263 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/dd89e1fd-6ae7-4030-b252-fbf19e3f687f-data\") pod \"nfs-server-provisioner-0\" (UID: \"dd89e1fd-6ae7-4030-b252-fbf19e3f687f\") " pod="default/nfs-server-provisioner-0" Dec 13 14:18:10.039689 kubelet[2212]: I1213 14:18:10.039660 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mmjlr\" (UniqueName: \"kubernetes.io/projected/dd89e1fd-6ae7-4030-b252-fbf19e3f687f-kube-api-access-mmjlr\") pod \"nfs-server-provisioner-0\" (UID: \"dd89e1fd-6ae7-4030-b252-fbf19e3f687f\") " pod="default/nfs-server-provisioner-0" Dec 13 14:18:10.230401 env[1829]: time="2024-12-13T14:18:10.230232744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dd89e1fd-6ae7-4030-b252-fbf19e3f687f,Namespace:default,Attempt:0,}" Dec 13 14:18:10.500068 systemd-networkd[1545]: cali60e51b789ff: Link UP Dec 13 14:18:10.505282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:18:10.505481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:18:10.505749 systemd-networkd[1545]: cali60e51b789ff: Gained carrier Dec 13 14:18:10.507909 (udev-worker)[3560]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.354 [INFO][3543] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.27.246-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default dd89e1fd-6ae7-4030-b252-fbf19e3f687f 1122 0 2024-12-13 14:18:09 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.27.246 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.354 [INFO][3543] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.414 [INFO][3554] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" HandleID="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Workload="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.433 [INFO][3554] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" HandleID="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Workload="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316ae0), Attrs:map[string]string{"namespace":"default", "node":"172.31.27.246", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:18:10.414427975 +0000 UTC"}, Hostname:"172.31.27.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.433 [INFO][3554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.433 [INFO][3554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.434 [INFO][3554] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.27.246' Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.437 [INFO][3554] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.445 [INFO][3554] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.453 [INFO][3554] ipam/ipam.go 489: Trying affinity for 192.168.73.128/26 host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.456 [INFO][3554] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.460 [INFO][3554] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.461 [INFO][3554] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.463 [INFO][3554] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.473 [INFO][3554] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.492 [INFO][3554] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.131/26] block=192.168.73.128/26 handle="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.492 [INFO][3554] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.131/26] handle="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" host="172.31.27.246" Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.492 [INFO][3554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:10.532609 env[1829]: 2024-12-13 14:18:10.492 [INFO][3554] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.131/26] IPv6=[] ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" HandleID="k8s-pod-network.722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Workload="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.537910 env[1829]: 2024-12-13 14:18:10.495 [INFO][3543] cni-plugin/k8s.go 386: Populated endpoint ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dd89e1fd-6ae7-4030-b252-fbf19e3f687f", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.73.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:10.537910 env[1829]: 2024-12-13 14:18:10.496 [INFO][3543] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.131/32] ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.537910 env[1829]: 2024-12-13 14:18:10.496 [INFO][3543] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.537910 env[1829]: 2024-12-13 14:18:10.507 [INFO][3543] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.538335 env[1829]: 2024-12-13 14:18:10.508 [INFO][3543] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"dd89e1fd-6ae7-4030-b252-fbf19e3f687f", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.73.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"52:e2:33:ea:18:87", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:10.538335 env[1829]: 2024-12-13 14:18:10.529 [INFO][3543] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.27.246-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:18:10.561000 audit[3576]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:10.561000 audit[3576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffce5b24e0 a2=0 a3=ffff95e81fa8 items=0 ppid=2867 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.561000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:10.590136 env[1829]: time="2024-12-13T14:18:10.589728442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:10.590136 env[1829]: time="2024-12-13T14:18:10.589803165Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:10.590136 env[1829]: time="2024-12-13T14:18:10.589828605Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:10.591193 env[1829]: time="2024-12-13T14:18:10.591015016Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c pid=3585 runtime=io.containerd.runc.v2 Dec 13 14:18:10.623412 systemd[1]: Started cri-containerd-722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c.scope. Dec 13 14:18:10.642435 kubelet[2212]: E1213 14:18:10.642337 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.657000 audit: BPF prog-id=124 op=LOAD Dec 13 14:18:10.657000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.657000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3585 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732326130623561613666626532353235343461653039383666336335 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3585 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732326130623561613666626532353235343461653039383666336335 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit: BPF prog-id=125 op=LOAD Dec 13 14:18:10.658000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3585 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732326130623561613666626532353235343461653039383666336335 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.658000 audit: BPF prog-id=126 op=LOAD Dec 13 14:18:10.658000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3585 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732326130623561613666626532353235343461653039383666336335 Dec 13 14:18:10.659000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:18:10.659000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:10.659000 audit: BPF prog-id=127 op=LOAD Dec 13 14:18:10.659000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3585 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732326130623561613666626532353235343461653039383666336335 Dec 13 14:18:10.706853 env[1829]: time="2024-12-13T14:18:10.706795509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:dd89e1fd-6ae7-4030-b252-fbf19e3f687f,Namespace:default,Attempt:0,} returns sandbox id \"722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c\"" Dec 13 14:18:10.710843 env[1829]: time="2024-12-13T14:18:10.710432393Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:18:11.642959 kubelet[2212]: E1213 14:18:11.642888 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:12.220586 systemd-networkd[1545]: cali60e51b789ff: Gained IPv6LL Dec 13 14:18:12.643631 kubelet[2212]: E1213 14:18:12.643573 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:13.644054 kubelet[2212]: E1213 14:18:13.643979 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:14.125714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4248595777.mount: Deactivated successfully. Dec 13 14:18:14.644319 kubelet[2212]: E1213 14:18:14.644246 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:15.644635 kubelet[2212]: E1213 14:18:15.644565 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:16.645463 kubelet[2212]: E1213 14:18:16.645392 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:17.646378 kubelet[2212]: E1213 14:18:17.646322 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:17.661643 env[1829]: time="2024-12-13T14:18:17.661586287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:17.667091 env[1829]: time="2024-12-13T14:18:17.667026741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:17.670376 env[1829]: time="2024-12-13T14:18:17.670326262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:17.673373 env[1829]: time="2024-12-13T14:18:17.673322834Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:17.674958 env[1829]: time="2024-12-13T14:18:17.674875245Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 14:18:17.680342 env[1829]: time="2024-12-13T14:18:17.680286876Z" level=info msg="CreateContainer within sandbox \"722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:18:17.701659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1497781067.mount: Deactivated successfully. Dec 13 14:18:17.715044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3842693448.mount: Deactivated successfully. Dec 13 14:18:17.729142 env[1829]: time="2024-12-13T14:18:17.729078561Z" level=info msg="CreateContainer within sandbox \"722a0b5aa6fbe252544ae0986f3c58c612b839201f16704d538acca27f7dda2c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d98866152a76fccf55fbab6f51f83fc78929959172188bfacdc8a0a9e15ad935\"" Dec 13 14:18:17.730397 env[1829]: time="2024-12-13T14:18:17.730330856Z" level=info msg="StartContainer for \"d98866152a76fccf55fbab6f51f83fc78929959172188bfacdc8a0a9e15ad935\"" Dec 13 14:18:17.769446 systemd[1]: Started cri-containerd-d98866152a76fccf55fbab6f51f83fc78929959172188bfacdc8a0a9e15ad935.scope. Dec 13 14:18:17.800195 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:18:17.800341 kernel: audit: type=1400 audit(1734099497.797:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.814176 kernel: audit: type=1400 audit(1734099497.797:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.821352 kernel: audit: type=1400 audit(1734099497.797:777): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.828679 kernel: audit: type=1400 audit(1734099497.797:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.847341 kernel: audit: type=1400 audit(1734099497.797:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.847501 kernel: audit: type=1400 audit(1734099497.797:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.854938 kernel: audit: type=1400 audit(1734099497.797:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.862738 kernel: audit: type=1400 audit(1734099497.797:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.870217 kernel: audit: type=1400 audit(1734099497.797:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.877660 kernel: audit: type=1400 audit(1734099497.798:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.798000 audit: BPF prog-id=128 op=LOAD Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=3585 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:17.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383836363135326137366663636635356662616236663531663833 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=3585 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:17.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383836363135326137366663636635356662616236663531663833 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.806000 audit: BPF prog-id=129 op=LOAD Dec 13 14:18:17.806000 audit[3637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=3585 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:17.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383836363135326137366663636635356662616236663531663833 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit: BPF prog-id=130 op=LOAD Dec 13 14:18:17.813000 audit[3637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=3585 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:17.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383836363135326137366663636635356662616236663531663833 Dec 13 14:18:17.813000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:18:17.813000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:17.813000 audit: BPF prog-id=131 op=LOAD Dec 13 14:18:17.813000 audit[3637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=3585 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:17.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383836363135326137366663636635356662616236663531663833 Dec 13 14:18:17.885617 env[1829]: time="2024-12-13T14:18:17.885556802Z" level=info msg="StartContainer for \"d98866152a76fccf55fbab6f51f83fc78929959172188bfacdc8a0a9e15ad935\" returns successfully" Dec 13 14:18:17.987000 audit[3667]: AVC avc: denied { search } for pid=3667 comm="rpcbind" name="crypto" dev="proc" ino=19522 scontext=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:18:17.987000 audit[3667]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9c41f000 a2=0 a3=0 items=0 ppid=3649 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 key=(null) Dec 13 14:18:17.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:18:18.073000 audit[3674]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:18.073000 audit[3674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc3fbda90 a2=0 a3=1 items=0 ppid=2374 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:18.075000 audit[3673]: AVC avc: denied { search } for pid=3673 comm="dbus-daemon" name="crypto" dev="proc" ino=19522 scontext=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:18:18.075000 audit[3673]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffacc7f000 a2=0 a3=0 items=0 ppid=3649 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 key=(null) Dec 13 14:18:18.075000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:18:18.083000 audit[3675]: AVC avc: denied { watch } for pid=3675 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538669 scontext=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c613,c804 tclass=dir permissive=0 Dec 13 14:18:18.083000 audit[3675]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaab0e87a40 a2=2c8 a3=aaaab0e6ca60 items=0 ppid=3649 pid=3675 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 key=(null) Dec 13 14:18:18.083000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:18:18.082000 audit[3674]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:18.082000 audit[3674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffc3fbda90 a2=0 a3=1 items=0 ppid=2374 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:18.091000 audit[3676]: AVC avc: denied { read } for pid=3676 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=19617 scontext=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:18:18.091000 audit[3676]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb6dfa570 a2=80000 a3=0 items=0 ppid=3649 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 key=(null) Dec 13 14:18:18.091000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:18:18.093000 audit[3676]: AVC avc: denied { search } for pid=3676 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19522 scontext=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:18:18.093000 audit[3676]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb618f000 a2=0 a3=0 items=0 ppid=3649 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c613,c804 key=(null) Dec 13 14:18:18.093000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:18:18.646789 kubelet[2212]: E1213 14:18:18.646727 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:19.646854 kubelet[2212]: E1213 14:18:19.646816 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:20.622719 systemd[1]: run-containerd-runc-k8s.io-5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d-runc.EgHkLr.mount: Deactivated successfully. Dec 13 14:18:20.648591 kubelet[2212]: E1213 14:18:20.648498 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:20.748891 kubelet[2212]: I1213 14:18:20.748817 2212 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=4.7807274159999995 podStartE2EDuration="11.748796027s" podCreationTimestamp="2024-12-13 14:18:09 +0000 UTC" firstStartedPulling="2024-12-13 14:18:10.709555889 +0000 UTC m=+48.085398655" lastFinishedPulling="2024-12-13 14:18:17.6776245 +0000 UTC m=+55.053467266" observedRunningTime="2024-12-13 14:18:18.045659083 +0000 UTC m=+55.421501885" watchObservedRunningTime="2024-12-13 14:18:20.748796027 +0000 UTC m=+58.124638793" Dec 13 14:18:21.648836 kubelet[2212]: E1213 14:18:21.648772 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:22.435168 amazon-ssm-agent[1807]: 2024-12-13 14:18:22 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:18:22.649888 kubelet[2212]: E1213 14:18:22.649842 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:23.602742 kubelet[2212]: E1213 14:18:23.602685 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:23.650720 kubelet[2212]: E1213 14:18:23.650642 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:23.660710 env[1829]: time="2024-12-13T14:18:23.660642966Z" level=info msg="StopPodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\"" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.736 [WARNING][3719] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-csi--node--driver--9xwl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d", Pod:"csi-node-driver-9xwl8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid69608f398b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.736 [INFO][3719] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.736 [INFO][3719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" iface="eth0" netns="" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.736 [INFO][3719] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.736 [INFO][3719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.779 [INFO][3726] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.779 [INFO][3726] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.779 [INFO][3726] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.793 [WARNING][3726] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.794 [INFO][3726] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.796 [INFO][3726] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:23.801232 env[1829]: 2024-12-13 14:18:23.798 [INFO][3719] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.802273 env[1829]: time="2024-12-13T14:18:23.801269983Z" level=info msg="TearDown network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" successfully" Dec 13 14:18:23.802273 env[1829]: time="2024-12-13T14:18:23.801315222Z" level=info msg="StopPodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" returns successfully" Dec 13 14:18:23.803159 env[1829]: time="2024-12-13T14:18:23.803113743Z" level=info msg="RemovePodSandbox for \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\"" Dec 13 14:18:23.803408 env[1829]: time="2024-12-13T14:18:23.803329309Z" level=info msg="Forcibly stopping sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\"" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.873 [WARNING][3744] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-csi--node--driver--9xwl8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02da707f-4a83-4da6-bd1d-8d8ad7f4aadc", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"c8530a42b45e3f943e2727847ee45d29419f68fe65f16a3c3896e63c4084379d", Pod:"csi-node-driver-9xwl8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid69608f398b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.873 [INFO][3744] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.873 [INFO][3744] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" iface="eth0" netns="" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.873 [INFO][3744] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.873 [INFO][3744] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.950 [INFO][3753] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.950 [INFO][3753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.950 [INFO][3753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.962 [WARNING][3753] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.962 [INFO][3753] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" HandleID="k8s-pod-network.ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Workload="172.31.27.246-k8s-csi--node--driver--9xwl8-eth0" Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.965 [INFO][3753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:23.969331 env[1829]: 2024-12-13 14:18:23.967 [INFO][3744] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d" Dec 13 14:18:23.970841 env[1829]: time="2024-12-13T14:18:23.969277321Z" level=info msg="TearDown network for sandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" successfully" Dec 13 14:18:23.974884 env[1829]: time="2024-12-13T14:18:23.974822846Z" level=info msg="RemovePodSandbox \"ce14f6bab6e3b0ae658b2594c410c8d29bca961c23c3ae9821d04b0cc61ee90d\" returns successfully" Dec 13 14:18:23.975653 env[1829]: time="2024-12-13T14:18:23.975591644Z" level=info msg="StopPodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\"" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.038 [WARNING][3772] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4706c355-3971-4222-9ce7-1af030650670", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc", Pod:"nginx-deployment-8587fbcb89-blkd8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali596bd37b908", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.039 [INFO][3772] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.039 [INFO][3772] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" iface="eth0" netns="" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.039 [INFO][3772] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.039 [INFO][3772] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.079 [INFO][3778] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.080 [INFO][3778] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.080 [INFO][3778] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.092 [WARNING][3778] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.092 [INFO][3778] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.094 [INFO][3778] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:24.098858 env[1829]: 2024-12-13 14:18:24.096 [INFO][3772] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.100147 env[1829]: time="2024-12-13T14:18:24.098893175Z" level=info msg="TearDown network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" successfully" Dec 13 14:18:24.100147 env[1829]: time="2024-12-13T14:18:24.098969374Z" level=info msg="StopPodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" returns successfully" Dec 13 14:18:24.100147 env[1829]: time="2024-12-13T14:18:24.100025522Z" level=info msg="RemovePodSandbox for \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\"" Dec 13 14:18:24.100348 env[1829]: time="2024-12-13T14:18:24.100131937Z" level=info msg="Forcibly stopping sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\"" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.165 [WARNING][3798] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"4706c355-3971-4222-9ce7-1af030650670", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"5eefa8250fdca8c42c58cd50f83b6b4d208a84f58fdaf44ec4f40fea7c8037fc", Pod:"nginx-deployment-8587fbcb89-blkd8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali596bd37b908", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.165 [INFO][3798] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.165 [INFO][3798] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" iface="eth0" netns="" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.166 [INFO][3798] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.166 [INFO][3798] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.200 [INFO][3805] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.200 [INFO][3805] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.200 [INFO][3805] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.213 [WARNING][3805] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.213 [INFO][3805] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" HandleID="k8s-pod-network.f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Workload="172.31.27.246-k8s-nginx--deployment--8587fbcb89--blkd8-eth0" Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.216 [INFO][3805] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:24.221013 env[1829]: 2024-12-13 14:18:24.218 [INFO][3798] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2" Dec 13 14:18:24.222896 env[1829]: time="2024-12-13T14:18:24.220966667Z" level=info msg="TearDown network for sandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" successfully" Dec 13 14:18:24.227555 env[1829]: time="2024-12-13T14:18:24.227488854Z" level=info msg="RemovePodSandbox \"f368c1994619d7a7df8e67c19e2c9afdb3847bf4005653d7a4e3838851b52ea2\" returns successfully" Dec 13 14:18:24.651456 kubelet[2212]: E1213 14:18:24.651392 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:25.651716 kubelet[2212]: E1213 14:18:25.651652 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:26.652717 kubelet[2212]: E1213 14:18:26.652655 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:27.653775 kubelet[2212]: E1213 14:18:27.653733 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:28.654784 kubelet[2212]: E1213 14:18:28.654710 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:29.655149 kubelet[2212]: E1213 14:18:29.655106 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:30.655952 kubelet[2212]: E1213 14:18:30.655865 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:31.656965 kubelet[2212]: E1213 14:18:31.656890 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:32.658581 kubelet[2212]: E1213 14:18:32.658538 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:33.660248 kubelet[2212]: E1213 14:18:33.660176 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:34.660672 kubelet[2212]: E1213 14:18:34.660605 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:35.661377 kubelet[2212]: E1213 14:18:35.661333 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:36.662216 kubelet[2212]: E1213 14:18:36.662144 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:37.662964 kubelet[2212]: E1213 14:18:37.662899 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:38.663837 kubelet[2212]: E1213 14:18:38.663793 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:39.665442 kubelet[2212]: E1213 14:18:39.665378 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:40.665880 kubelet[2212]: E1213 14:18:40.665837 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:41.667147 kubelet[2212]: E1213 14:18:41.667107 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:42.668769 kubelet[2212]: E1213 14:18:42.668728 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:43.219479 systemd[1]: Created slice kubepods-besteffort-pod4925298d_f5fc_4a21_b66a_e50b2189196c.slice. Dec 13 14:18:43.253401 kubelet[2212]: I1213 14:18:43.253348 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d5f9d974-6d54-48e8-8515-520ecd7208f7\" (UniqueName: \"kubernetes.io/nfs/4925298d-f5fc-4a21-b66a-e50b2189196c-pvc-d5f9d974-6d54-48e8-8515-520ecd7208f7\") pod \"test-pod-1\" (UID: \"4925298d-f5fc-4a21-b66a-e50b2189196c\") " pod="default/test-pod-1" Dec 13 14:18:43.253587 kubelet[2212]: I1213 14:18:43.253415 2212 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-64mm7\" (UniqueName: \"kubernetes.io/projected/4925298d-f5fc-4a21-b66a-e50b2189196c-kube-api-access-64mm7\") pod \"test-pod-1\" (UID: \"4925298d-f5fc-4a21-b66a-e50b2189196c\") " pod="default/test-pod-1" Dec 13 14:18:43.388184 kernel: Failed to create system directory netfs Dec 13 14:18:43.388341 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:18:43.388406 kernel: audit: type=1400 audit(1734099523.382:800): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.388463 kernel: Failed to create system directory netfs Dec 13 14:18:43.382000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.382000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.397286 kernel: audit: type=1400 audit(1734099523.382:800): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.397358 kernel: Failed to create system directory netfs Dec 13 14:18:43.382000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.406457 kernel: audit: type=1400 audit(1734099523.382:800): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.406530 kernel: Failed to create system directory netfs Dec 13 14:18:43.382000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.423073 kernel: audit: type=1400 audit(1734099523.382:800): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.382000 audit[3837]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae562c5e0 a1=12c14 a2=aaaab1b1e028 a3=aaaae561d010 items=0 ppid=1670 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.434320 kernel: audit: type=1300 audit(1734099523.382:800): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae562c5e0 a1=12c14 a2=aaaab1b1e028 a3=aaaae561d010 items=0 ppid=1670 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.382000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:18:43.438402 kernel: audit: type=1327 audit(1734099523.382:800): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:18:43.438474 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.447560 kernel: audit: type=1400 audit(1734099523.426:801): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.447645 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.456926 kernel: audit: type=1400 audit(1734099523.426:801): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.457027 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.466721 kernel: audit: type=1400 audit(1734099523.426:801): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.466822 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.475776 kernel: audit: type=1400 audit(1734099523.426:801): avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.475836 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.477961 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.480956 kernel: Failed to create system directory fscache Dec 13 14:18:43.481032 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.484418 kernel: Failed to create system directory fscache Dec 13 14:18:43.484485 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.487746 kernel: Failed to create system directory fscache Dec 13 14:18:43.487826 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.491180 kernel: Failed to create system directory fscache Dec 13 14:18:43.491242 kernel: Failed to create system directory fscache Dec 13 14:18:43.426000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.494384 kernel: FS-Cache: Loaded Dec 13 14:18:43.426000 audit[3837]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae583f210 a1=4c344 a2=aaaab1b1e028 a3=aaaae561d010 items=0 ppid=1670 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.426000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.534454 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.534562 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.534615 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.537973 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.538023 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.541380 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.541455 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.544843 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.544913 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.548249 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.548312 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.549978 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.553384 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.553444 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.556758 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.556819 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.560174 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.560298 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.563673 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.563745 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.567082 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.567149 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.570504 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.570574 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.573922 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.573989 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.577274 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.577323 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.582395 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.582467 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.582537 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.585825 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.585892 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.589161 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.589222 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.592487 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.592560 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.595886 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.595971 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.599227 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.599287 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.602532 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.602654 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.602966 kubelet[2212]: E1213 14:18:43.602880 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.606003 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.606071 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.609329 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.609429 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.612661 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.612735 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.616076 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.616139 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.619423 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.619496 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.622754 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.622846 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.626230 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.626279 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.627974 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.631291 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.631374 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.634701 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.634761 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.636448 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.639862 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.639950 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.643320 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.645119 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.645212 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.648572 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.648657 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.651963 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.652036 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.655449 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.655512 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.658785 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.658866 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.662206 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.663947 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.664019 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.667420 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.667504 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.669896 kubelet[2212]: E1213 14:18:43.669826 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:43.670924 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.671113 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.674513 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.674563 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.677857 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.677918 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.681197 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.681281 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.683050 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.686359 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.686407 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.689697 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.689745 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.693028 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.693114 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.694799 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.698190 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.698250 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.701481 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.701578 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.704972 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.705021 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.708308 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.708369 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.711643 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.711729 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.715119 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.715204 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.718448 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.718497 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.721735 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.721831 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.725120 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.725210 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.728638 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.728717 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.735569 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.735703 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.735791 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.735864 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.738799 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.738859 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.742119 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.742227 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.743863 kernel: Failed to create system directory sunrpc Dec 13 14:18:43.522000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.757559 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:18:43.757750 kernel: RPC: Registered udp transport module. Dec 13 14:18:43.757832 kernel: RPC: Registered tcp transport module. Dec 13 14:18:43.761203 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:18:43.522000 audit[3837]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae588b560 a1=14a504 a2=aaaab1b1e028 a3=aaaae561d010 items=6 ppid=1670 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.522000 audit: CWD cwd="/" Dec 13 14:18:43.522000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:43.522000 audit: PATH item=1 name=(null) inode=19991 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:43.522000 audit: PATH item=2 name=(null) inode=19991 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:43.522000 audit: PATH item=3 name=(null) inode=19992 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:43.522000 audit: PATH item=4 name=(null) inode=19991 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:43.522000 audit: PATH item=5 name=(null) inode=19993 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:43.522000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.815342 kernel: Failed to create system directory nfs Dec 13 14:18:43.815437 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.817287 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.819231 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.821034 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.822807 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.826363 kernel: Failed to create system directory nfs Dec 13 14:18:43.826465 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.828332 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.830152 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.831984 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.833782 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.837603 kernel: Failed to create system directory nfs Dec 13 14:18:43.837704 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.839739 kernel: Failed to create system directory nfs Dec 13 14:18:43.839979 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.843144 kernel: Failed to create system directory nfs Dec 13 14:18:43.843214 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.846337 kernel: Failed to create system directory nfs Dec 13 14:18:43.846402 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.849544 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.851171 kernel: Failed to create system directory nfs Dec 13 14:18:43.851222 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.854339 kernel: Failed to create system directory nfs Dec 13 14:18:43.854406 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.857524 kernel: Failed to create system directory nfs Dec 13 14:18:43.857586 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.860730 kernel: Failed to create system directory nfs Dec 13 14:18:43.860826 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.863961 kernel: Failed to create system directory nfs Dec 13 14:18:43.864029 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.867078 kernel: Failed to create system directory nfs Dec 13 14:18:43.867128 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.870323 kernel: Failed to create system directory nfs Dec 13 14:18:43.870373 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.871964 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.875083 kernel: Failed to create system directory nfs Dec 13 14:18:43.875133 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.878250 kernel: Failed to create system directory nfs Dec 13 14:18:43.878313 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.881460 kernel: Failed to create system directory nfs Dec 13 14:18:43.881510 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.884647 kernel: Failed to create system directory nfs Dec 13 14:18:43.884698 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.887856 kernel: Failed to create system directory nfs Dec 13 14:18:43.887948 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.891086 kernel: Failed to create system directory nfs Dec 13 14:18:43.891147 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.894308 kernel: Failed to create system directory nfs Dec 13 14:18:43.894373 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.896030 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.899125 kernel: Failed to create system directory nfs Dec 13 14:18:43.899188 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.902552 kernel: Failed to create system directory nfs Dec 13 14:18:43.902625 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.905797 kernel: Failed to create system directory nfs Dec 13 14:18:43.905860 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.909013 kernel: Failed to create system directory nfs Dec 13 14:18:43.909074 kernel: Failed to create system directory nfs Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.805000 audit[3837]: AVC avc: denied { confidentiality } for pid=3837 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.912273 kernel: Failed to create system directory nfs Dec 13 14:18:43.944337 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:18:43.805000 audit[3837]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae5a346f0 a1=116204 a2=aaaab1b1e028 a3=aaaae561d010 items=0 ppid=1670 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.805000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.004831 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.004965 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.005037 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.008000 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.008062 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.009649 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.012909 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.013046 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.016239 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.016289 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.019482 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.019533 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.022822 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.022907 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.024617 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.026293 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.029601 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.029651 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.031296 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.034744 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.034795 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.036428 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.038140 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.041478 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.041528 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.044962 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.045011 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.048357 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.048416 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.051674 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.051726 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.055089 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.055138 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.058413 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.058475 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.061798 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.061902 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.063561 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.065268 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.068637 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.068701 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.072000 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.072074 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.073708 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.076978 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.077040 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.080280 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.080328 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.083636 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.083687 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.086971 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.087020 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.090420 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.090508 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.094070 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.094151 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.097341 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.097491 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.100820 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.100895 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.104163 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.104243 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.107440 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.107515 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.110687 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.110762 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.114182 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.114286 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.115913 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.119211 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.119360 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.121010 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.124287 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.124366 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.125800 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.127512 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.129063 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.130712 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.132297 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.134016 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.135591 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.137284 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.138804 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.140526 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.142170 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.143669 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.145362 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.146869 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.148579 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.150121 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.151788 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.155046 kernel: Failed to create system directory nfs4 Dec 13 14:18:44.155134 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.156567 kernel: Failed to create system directory nfs4 Dec 13 14:18:43.986000 audit[3842]: AVC avc: denied { confidentiality } for pid=3842 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.363724 kernel: NFS: Registering the id_resolver key type Dec 13 14:18:44.363993 kernel: Key type id_resolver registered Dec 13 14:18:44.364121 kernel: Key type id_legacy registered Dec 13 14:18:43.986000 audit[3842]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9893a010 a1=19c49c a2=aaaac6a5e028 a3=aaaad5fc8010 items=0 ppid=1670 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.986000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.386139 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.386259 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.386307 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.389398 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.389491 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.391048 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.394383 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.394435 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.395940 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.397677 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.399253 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.400981 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.402541 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.404315 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.405985 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.407685 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.409333 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.411026 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.412697 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.414489 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.416152 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.417837 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.419528 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.421210 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.422844 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.424565 kernel: Failed to create system directory rpcgss Dec 13 14:18:44.379000 audit[3844]: AVC avc: denied { confidentiality } for pid=3844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:44.379000 audit[3844]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff99372010 a1=5ee04 a2=aaaaaf5de028 a3=aaaaebeb0010 items=0 ppid=1670 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.379000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:18:44.453063 nfsidmap[3851]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:18:44.459026 nfsidmap[3852]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Dec 13 14:18:44.480000 audit[2026]: AVC avc: denied { watch_reads } for pid=2026 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:18:44.480000 audit[2026]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeace21f0 a2=10 a3=0 items=0 ppid=1 pid=2026 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.480000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:18:44.480000 audit[2026]: AVC avc: denied { watch_reads } for pid=2026 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:18:44.480000 audit[2026]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeace21f0 a2=10 a3=0 items=0 ppid=1 pid=2026 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.480000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:18:44.480000 audit[2026]: AVC avc: denied { watch_reads } for pid=2026 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:18:44.480000 audit[2026]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeace21f0 a2=10 a3=0 items=0 ppid=1 pid=2026 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.480000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:18:44.480000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:18:44.480000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:18:44.480000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:18:44.670422 kubelet[2212]: E1213 14:18:44.670299 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:44.725339 env[1829]: time="2024-12-13T14:18:44.725250580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4925298d-f5fc-4a21-b66a-e50b2189196c,Namespace:default,Attempt:0,}" Dec 13 14:18:44.936295 (udev-worker)[3843]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:18:44.939574 systemd-networkd[1545]: cali5ec59c6bf6e: Link UP Dec 13 14:18:44.945428 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:18:44.945566 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:18:44.945624 systemd-networkd[1545]: cali5ec59c6bf6e: Gained carrier Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.810 [INFO][3854] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.27.246-k8s-test--pod--1-eth0 default 4925298d-f5fc-4a21-b66a-e50b2189196c 1230 0 2024-12-13 14:18:10 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.27.246 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.811 [INFO][3854] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.860 [INFO][3865] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" HandleID="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Workload="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.880 [INFO][3865] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" HandleID="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Workload="172.31.27.246-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318e90), Attrs:map[string]string{"namespace":"default", "node":"172.31.27.246", "pod":"test-pod-1", "timestamp":"2024-12-13 14:18:44.860721278 +0000 UTC"}, Hostname:"172.31.27.246", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.880 [INFO][3865] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.880 [INFO][3865] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.880 [INFO][3865] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.27.246' Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.884 [INFO][3865] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.890 [INFO][3865] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.898 [INFO][3865] ipam/ipam.go 489: Trying affinity for 192.168.73.128/26 host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.901 [INFO][3865] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.904 [INFO][3865] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.905 [INFO][3865] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.907 [INFO][3865] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7 Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.914 [INFO][3865] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.928 [INFO][3865] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.132/26] block=192.168.73.128/26 handle="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.928 [INFO][3865] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.132/26] handle="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" host="172.31.27.246" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.928 [INFO][3865] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.928 [INFO][3865] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.132/26] IPv6=[] ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" HandleID="k8s-pod-network.a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Workload="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.961834 env[1829]: 2024-12-13 14:18:44.931 [INFO][3854] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4925298d-f5fc-4a21-b66a-e50b2189196c", ResourceVersion:"1230", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:44.966983 env[1829]: 2024-12-13 14:18:44.931 [INFO][3854] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.132/32] ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.966983 env[1829]: 2024-12-13 14:18:44.931 [INFO][3854] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.966983 env[1829]: 2024-12-13 14:18:44.946 [INFO][3854] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.966983 env[1829]: 2024-12-13 14:18:44.947 [INFO][3854] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.27.246-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4925298d-f5fc-4a21-b66a-e50b2189196c", ResourceVersion:"1230", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.27.246", ContainerID:"a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c2:5b:0e:d9:f7:ac", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:44.966983 env[1829]: 2024-12-13 14:18:44.959 [INFO][3854] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.27.246-k8s-test--pod--1-eth0" Dec 13 14:18:44.989298 env[1829]: time="2024-12-13T14:18:44.989168869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:44.989447 env[1829]: time="2024-12-13T14:18:44.989316132Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:44.989447 env[1829]: time="2024-12-13T14:18:44.989379936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:44.989715 env[1829]: time="2024-12-13T14:18:44.989649071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7 pid=3893 runtime=io.containerd.runc.v2 Dec 13 14:18:45.000000 audit[3890]: NETFILTER_CFG table=filter:82 family=2 entries=44 op=nft_register_chain pid=3890 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:45.000000 audit[3890]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22252 a0=3 a1=ffffde230c40 a2=0 a3=ffff981dffa8 items=0 ppid=2867 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.000000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:45.019461 systemd[1]: Started cri-containerd-a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7.scope. Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.050000 audit: BPF prog-id=132 op=LOAD Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3893 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396431313261623265613638646139623564306563666231613963 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3893 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396431313261623265613638646139623564306563666231613963 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.052000 audit: BPF prog-id=133 op=LOAD Dec 13 14:18:45.052000 audit[3901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3893 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396431313261623265613638646139623564306563666231613963 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit: BPF prog-id=134 op=LOAD Dec 13 14:18:45.053000 audit[3901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3893 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396431313261623265613638646139623564306563666231613963 Dec 13 14:18:45.053000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:18:45.053000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.053000 audit: BPF prog-id=135 op=LOAD Dec 13 14:18:45.053000 audit[3901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3893 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134396431313261623265613638646139623564306563666231613963 Dec 13 14:18:45.092559 env[1829]: time="2024-12-13T14:18:45.092497538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4925298d-f5fc-4a21-b66a-e50b2189196c,Namespace:default,Attempt:0,} returns sandbox id \"a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7\"" Dec 13 14:18:45.096703 env[1829]: time="2024-12-13T14:18:45.096646193Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:18:45.510590 env[1829]: time="2024-12-13T14:18:45.510514587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.514082 env[1829]: time="2024-12-13T14:18:45.514020824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.518958 env[1829]: time="2024-12-13T14:18:45.518876527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.521893 env[1829]: time="2024-12-13T14:18:45.521834140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.523606 env[1829]: time="2024-12-13T14:18:45.523553839Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 14:18:45.528553 env[1829]: time="2024-12-13T14:18:45.528498738Z" level=info msg="CreateContainer within sandbox \"a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:18:45.550032 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1872610157.mount: Deactivated successfully. Dec 13 14:18:45.564850 env[1829]: time="2024-12-13T14:18:45.564770086Z" level=info msg="CreateContainer within sandbox \"a49d112ab2ea68da9b5d0ecfb1a9c02ee29b2fe0dca2752c16f413ca089bcde7\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"8d05750fa5a0248662c95e618b8f1e7b04b24595ae26e0dda3ef91d0f2caf7c4\"" Dec 13 14:18:45.565836 env[1829]: time="2024-12-13T14:18:45.565788737Z" level=info msg="StartContainer for \"8d05750fa5a0248662c95e618b8f1e7b04b24595ae26e0dda3ef91d0f2caf7c4\"" Dec 13 14:18:45.594814 systemd[1]: Started cri-containerd-8d05750fa5a0248662c95e618b8f1e7b04b24595ae26e0dda3ef91d0f2caf7c4.scope. Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.632000 audit: BPF prog-id=136 op=LOAD Dec 13 14:18:45.634000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.634000 audit[3935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3893 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864303537353066613561303234383636326339356536313862386631 Dec 13 14:18:45.634000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.634000 audit[3935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3893 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864303537353066613561303234383636326339356536313862386631 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.635000 audit: BPF prog-id=137 op=LOAD Dec 13 14:18:45.635000 audit[3935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3893 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864303537353066613561303234383636326339356536313862386631 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.636000 audit: BPF prog-id=138 op=LOAD Dec 13 14:18:45.636000 audit[3935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3893 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864303537353066613561303234383636326339356536313862386631 Dec 13 14:18:45.637000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:18:45.637000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.638000 audit: BPF prog-id=139 op=LOAD Dec 13 14:18:45.638000 audit[3935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3893 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864303537353066613561303234383636326339356536313862386631 Dec 13 14:18:45.671064 env[1829]: time="2024-12-13T14:18:45.670990357Z" level=info msg="StartContainer for \"8d05750fa5a0248662c95e618b8f1e7b04b24595ae26e0dda3ef91d0f2caf7c4\" returns successfully" Dec 13 14:18:45.671309 kubelet[2212]: E1213 14:18:45.671277 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:46.652341 systemd-networkd[1545]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:18:46.672408 kubelet[2212]: E1213 14:18:46.672339 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:47.672777 kubelet[2212]: E1213 14:18:47.672739 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:48.673888 kubelet[2212]: E1213 14:18:48.673848 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:49.675269 kubelet[2212]: E1213 14:18:49.675205 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:50.621714 systemd[1]: run-containerd-runc-k8s.io-5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d-runc.gh2tPt.mount: Deactivated successfully. Dec 13 14:18:50.676350 kubelet[2212]: E1213 14:18:50.676272 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:51.676646 kubelet[2212]: E1213 14:18:51.676587 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:52.677365 kubelet[2212]: E1213 14:18:52.677299 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:53.678058 kubelet[2212]: E1213 14:18:53.678000 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:54.679086 kubelet[2212]: E1213 14:18:54.679008 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:55.680091 kubelet[2212]: E1213 14:18:55.680025 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:56.680882 kubelet[2212]: E1213 14:18:56.680815 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:57.681875 kubelet[2212]: E1213 14:18:57.681789 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:58.682445 kubelet[2212]: E1213 14:18:58.682400 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:59.684058 kubelet[2212]: E1213 14:18:59.684017 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:00.685737 kubelet[2212]: E1213 14:19:00.685695 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:01.687504 kubelet[2212]: E1213 14:19:01.687463 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:02.688789 kubelet[2212]: E1213 14:19:02.688746 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:03.603080 kubelet[2212]: E1213 14:19:03.603014 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:03.689868 kubelet[2212]: E1213 14:19:03.689808 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:04.690310 kubelet[2212]: E1213 14:19:04.690249 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:05.690581 kubelet[2212]: E1213 14:19:05.690531 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:06.131610 kubelet[2212]: E1213 14:19:06.131534 2212 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:19:06.691901 kubelet[2212]: E1213 14:19:06.691862 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:07.692642 kubelet[2212]: E1213 14:19:07.692594 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:08.694450 kubelet[2212]: E1213 14:19:08.694410 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:09.695324 kubelet[2212]: E1213 14:19:09.695253 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:10.695495 kubelet[2212]: E1213 14:19:10.695434 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:11.696456 kubelet[2212]: E1213 14:19:11.696383 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:12.697639 kubelet[2212]: E1213 14:19:12.697571 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:13.698189 kubelet[2212]: E1213 14:19:13.698128 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:14.698516 kubelet[2212]: E1213 14:19:14.698471 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:15.488243 update_engine[1821]: I1213 14:19:15.488181 1821 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 14:19:15.488243 update_engine[1821]: I1213 14:19:15.488243 1821 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 14:19:15.489007 update_engine[1821]: I1213 14:19:15.488523 1821 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 14:19:15.489561 update_engine[1821]: I1213 14:19:15.489506 1821 omaha_request_params.cc:62] Current group set to lts Dec 13 14:19:15.489892 update_engine[1821]: I1213 14:19:15.489688 1821 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 14:19:15.489892 update_engine[1821]: I1213 14:19:15.489711 1821 update_attempter.cc:643] Scheduling an action processor start. Dec 13 14:19:15.489892 update_engine[1821]: I1213 14:19:15.489742 1821 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:19:15.489892 update_engine[1821]: I1213 14:19:15.489790 1821 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 14:19:15.490618 locksmithd[1883]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 14:19:15.491212 update_engine[1821]: I1213 14:19:15.490855 1821 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:19:15.491212 update_engine[1821]: I1213 14:19:15.490877 1821 omaha_request_action.cc:271] Request: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: Dec 13 14:19:15.491212 update_engine[1821]: I1213 14:19:15.490890 1821 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:19:15.496477 update_engine[1821]: I1213 14:19:15.496419 1821 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:19:15.496786 update_engine[1821]: I1213 14:19:15.496752 1821 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:19:15.520158 update_engine[1821]: E1213 14:19:15.520109 1821 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:19:15.520292 update_engine[1821]: I1213 14:19:15.520255 1821 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 14:19:15.699292 kubelet[2212]: E1213 14:19:15.699233 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:16.132563 kubelet[2212]: E1213 14:19:16.132510 2212 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:19:16.699630 kubelet[2212]: E1213 14:19:16.699561 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:17.700098 kubelet[2212]: E1213 14:19:17.700028 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:18.700244 kubelet[2212]: E1213 14:19:18.700172 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:19.700894 kubelet[2212]: E1213 14:19:19.700852 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:20.619516 systemd[1]: run-containerd-runc-k8s.io-5b42e8d7dde7fe29ec3b99f11343d8a4572f51172ed6ba352934d770ae69b56d-runc.ttWUq6.mount: Deactivated successfully. Dec 13 14:19:20.702709 kubelet[2212]: E1213 14:19:20.702612 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:21.703794 kubelet[2212]: E1213 14:19:21.703733 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:22.704253 kubelet[2212]: E1213 14:19:22.704189 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:23.602786 kubelet[2212]: E1213 14:19:23.602741 2212 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:23.704755 kubelet[2212]: E1213 14:19:23.704691 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:24.705171 kubelet[2212]: E1213 14:19:24.705117 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:25.471839 update_engine[1821]: I1213 14:19:25.471277 1821 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:19:25.471839 update_engine[1821]: I1213 14:19:25.471580 1821 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:19:25.471839 update_engine[1821]: I1213 14:19:25.471815 1821 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:19:25.472711 update_engine[1821]: E1213 14:19:25.472302 1821 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:19:25.472711 update_engine[1821]: I1213 14:19:25.472419 1821 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Dec 13 14:19:25.706680 kubelet[2212]: E1213 14:19:25.706609 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:26.133109 kubelet[2212]: E1213 14:19:26.133034 2212 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:19:26.707492 kubelet[2212]: E1213 14:19:26.707446 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:27.708826 kubelet[2212]: E1213 14:19:27.708760 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:28.709608 kubelet[2212]: E1213 14:19:28.709569 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:29.710709 kubelet[2212]: E1213 14:19:29.710667 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:30.711978 kubelet[2212]: E1213 14:19:30.711921 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:31.245398 kubelet[2212]: E1213 14:19:31.245286 2212 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": unexpected EOF" Dec 13 14:19:31.248597 kubelet[2212]: E1213 14:19:31.248522 2212 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection reset by peer" Dec 13 14:19:31.248597 kubelet[2212]: I1213 14:19:31.248585 2212 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Dec 13 14:19:31.249731 kubelet[2212]: E1213 14:19:31.249656 2212 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="200ms" Dec 13 14:19:31.450855 kubelet[2212]: E1213 14:19:31.450799 2212 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="400ms" Dec 13 14:19:31.713116 kubelet[2212]: E1213 14:19:31.713075 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:31.852776 kubelet[2212]: E1213 14:19:31.852712 2212 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.27.246?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="800ms" Dec 13 14:19:32.714806 kubelet[2212]: E1213 14:19:32.714745 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:33.715656 kubelet[2212]: E1213 14:19:33.715594 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:34.716188 kubelet[2212]: E1213 14:19:34.716148 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:35.468274 update_engine[1821]: I1213 14:19:35.468209 1821 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:19:35.468850 update_engine[1821]: I1213 14:19:35.468520 1821 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:19:35.468850 update_engine[1821]: I1213 14:19:35.468753 1821 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:19:35.471483 update_engine[1821]: E1213 14:19:35.471437 1821 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:19:35.471602 update_engine[1821]: I1213 14:19:35.471576 1821 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Dec 13 14:19:35.717896 kubelet[2212]: E1213 14:19:35.717836 2212 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"