Dec 13 01:53:14.053703 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:53:14.053738 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:53:14.053752 kernel: BIOS-provided physical RAM map: Dec 13 01:53:14.053763 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:53:14.053772 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 01:53:14.053782 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 01:53:14.053797 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 01:53:14.053808 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 01:53:14.053818 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 01:53:14.053829 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 01:53:14.053839 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 01:53:14.053850 kernel: printk: bootconsole [earlyser0] enabled Dec 13 01:53:14.053860 kernel: NX (Execute Disable) protection: active Dec 13 01:53:14.053871 kernel: efi: EFI v2.70 by Microsoft Dec 13 01:53:14.053887 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 01:53:14.053899 kernel: random: crng init done Dec 13 01:53:14.053910 kernel: SMBIOS 3.1.0 present. Dec 13 01:53:14.053922 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 01:53:14.053933 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 01:53:14.053944 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 01:53:14.053955 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 01:53:14.053966 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 01:53:14.053980 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 01:53:14.053991 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 01:53:14.054003 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 01:53:14.054014 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 01:53:14.054026 kernel: tsc: Detected 2593.907 MHz processor Dec 13 01:53:14.054038 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:53:14.054051 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:53:14.054063 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 01:53:14.054074 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:53:14.054086 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 01:53:14.054100 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 01:53:14.054112 kernel: Using GB pages for direct mapping Dec 13 01:53:14.054123 kernel: Secure boot disabled Dec 13 01:53:14.054135 kernel: ACPI: Early table checksum verification disabled Dec 13 01:53:14.054146 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 01:53:14.054158 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054170 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054182 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 01:53:14.054201 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 01:53:14.054213 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054225 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054238 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054250 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054263 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054277 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054290 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:53:14.054302 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 01:53:14.054315 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 01:53:14.054328 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 01:53:14.054340 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 01:53:14.054353 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 01:53:14.054365 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 01:53:14.054381 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 01:53:14.054393 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 01:53:14.054405 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 01:53:14.054418 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 01:53:14.054431 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 01:53:14.054443 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 01:53:14.054456 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 01:53:14.054468 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 01:53:14.054481 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 01:53:14.054496 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 01:53:14.054509 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 01:53:14.054521 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 01:53:14.054533 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 01:53:14.054546 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 01:53:14.054559 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 01:53:14.054571 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 01:53:14.054584 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 01:53:14.054596 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 01:53:14.054611 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 01:53:14.054624 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 01:53:14.054636 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 01:53:14.054649 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 01:53:14.056688 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 01:53:14.056706 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 01:53:14.056719 kernel: Zone ranges: Dec 13 01:53:14.056732 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:53:14.056745 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 01:53:14.056761 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:53:14.056774 kernel: Movable zone start for each node Dec 13 01:53:14.056787 kernel: Early memory node ranges Dec 13 01:53:14.056799 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:53:14.056813 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 01:53:14.056825 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 01:53:14.056838 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:53:14.056851 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 01:53:14.056863 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:53:14.056878 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:53:14.056891 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 01:53:14.056904 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 01:53:14.056917 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 01:53:14.056930 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:53:14.056942 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:53:14.056955 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:53:14.056968 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 01:53:14.056981 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 01:53:14.056995 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 01:53:14.057008 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 01:53:14.057021 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:53:14.057034 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 01:53:14.057047 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 01:53:14.057060 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 01:53:14.057072 kernel: pcpu-alloc: [0] 0 1 Dec 13 01:53:14.057084 kernel: Hyper-V: PV spinlocks enabled Dec 13 01:53:14.057096 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:53:14.057112 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 01:53:14.057124 kernel: Policy zone: Normal Dec 13 01:53:14.057139 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:53:14.057153 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:53:14.057166 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 01:53:14.057179 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:53:14.057192 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:53:14.057205 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 308056K reserved, 0K cma-reserved) Dec 13 01:53:14.057220 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 01:53:14.057233 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:53:14.057255 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:53:14.057270 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:53:14.057285 kernel: rcu: RCU event tracing is enabled. Dec 13 01:53:14.057298 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 01:53:14.057312 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:53:14.057325 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:53:14.057339 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:53:14.057352 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 01:53:14.057365 kernel: Using NULL legacy PIC Dec 13 01:53:14.057381 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 01:53:14.057394 kernel: Console: colour dummy device 80x25 Dec 13 01:53:14.057407 kernel: printk: console [tty1] enabled Dec 13 01:53:14.057421 kernel: printk: console [ttyS0] enabled Dec 13 01:53:14.057434 kernel: printk: bootconsole [earlyser0] disabled Dec 13 01:53:14.057450 kernel: ACPI: Core revision 20210730 Dec 13 01:53:14.057464 kernel: Failed to register legacy timer interrupt Dec 13 01:53:14.057478 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:53:14.057491 kernel: Hyper-V: Using IPI hypercalls Dec 13 01:53:14.057505 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) Dec 13 01:53:14.057519 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 01:53:14.057532 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 01:53:14.057546 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:53:14.057558 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:53:14.057572 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:53:14.057587 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:53:14.057600 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 01:53:14.057614 kernel: RETBleed: Vulnerable Dec 13 01:53:14.057626 kernel: Speculative Store Bypass: Vulnerable Dec 13 01:53:14.057639 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:53:14.057652 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:53:14.057674 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 01:53:14.057688 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:53:14.057701 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:53:14.057715 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:53:14.057730 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 01:53:14.057743 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 01:53:14.057757 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 01:53:14.057770 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:53:14.057783 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 01:53:14.057796 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 01:53:14.057809 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 01:53:14.057823 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 01:53:14.057836 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:53:14.057849 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:53:14.057862 kernel: LSM: Security Framework initializing Dec 13 01:53:14.057876 kernel: SELinux: Initializing. Dec 13 01:53:14.057891 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:53:14.057905 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:53:14.057919 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 01:53:14.057932 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 01:53:14.057945 kernel: signal: max sigframe size: 3632 Dec 13 01:53:14.057959 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:53:14.057972 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 01:53:14.057986 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:53:14.057999 kernel: x86: Booting SMP configuration: Dec 13 01:53:14.058012 kernel: .... node #0, CPUs: #1 Dec 13 01:53:14.058028 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 01:53:14.058043 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 01:53:14.058056 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 01:53:14.058069 kernel: smpboot: Max logical packages: 1 Dec 13 01:53:14.058083 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 01:53:14.058097 kernel: devtmpfs: initialized Dec 13 01:53:14.058110 kernel: x86/mm: Memory block size: 128MB Dec 13 01:53:14.058123 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 01:53:14.058139 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:53:14.058153 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 01:53:14.058167 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:53:14.058180 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:53:14.058194 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:53:14.058207 kernel: audit: type=2000 audit(1734054792.023:1): state=initialized audit_enabled=0 res=1 Dec 13 01:53:14.058220 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:53:14.058234 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:53:14.058248 kernel: cpuidle: using governor menu Dec 13 01:53:14.058264 kernel: ACPI: bus type PCI registered Dec 13 01:53:14.058278 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:53:14.058291 kernel: dca service started, version 1.12.1 Dec 13 01:53:14.058304 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:53:14.058318 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:53:14.058331 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:53:14.058345 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:53:14.058358 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:53:14.058371 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:53:14.058387 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:53:14.058400 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:53:14.058413 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:53:14.058427 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:53:14.058440 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:53:14.058454 kernel: ACPI: Interpreter enabled Dec 13 01:53:14.058467 kernel: ACPI: PM: (supports S0 S5) Dec 13 01:53:14.058481 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:53:14.058495 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:53:14.058510 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 01:53:14.058524 kernel: iommu: Default domain type: Translated Dec 13 01:53:14.058537 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:53:14.058550 kernel: vgaarb: loaded Dec 13 01:53:14.058564 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:53:14.058577 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:53:14.058591 kernel: PTP clock support registered Dec 13 01:53:14.058604 kernel: Registered efivars operations Dec 13 01:53:14.058617 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:53:14.058631 kernel: PCI: System does not support PCI Dec 13 01:53:14.058646 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 01:53:14.062013 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:53:14.062036 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:53:14.062050 kernel: pnp: PnP ACPI init Dec 13 01:53:14.062064 kernel: pnp: PnP ACPI: found 3 devices Dec 13 01:53:14.062077 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:53:14.062090 kernel: NET: Registered PF_INET protocol family Dec 13 01:53:14.062103 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 01:53:14.062122 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 01:53:14.062135 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:53:14.062149 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:53:14.062162 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 01:53:14.062175 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 01:53:14.062188 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:53:14.062201 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:53:14.062214 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:53:14.062227 kernel: NET: Registered PF_XDP protocol family Dec 13 01:53:14.062242 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:53:14.062255 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 01:53:14.062268 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 01:53:14.062281 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 01:53:14.062294 kernel: Initialise system trusted keyrings Dec 13 01:53:14.062307 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 01:53:14.062320 kernel: Key type asymmetric registered Dec 13 01:53:14.062333 kernel: Asymmetric key parser 'x509' registered Dec 13 01:53:14.062346 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:53:14.062361 kernel: io scheduler mq-deadline registered Dec 13 01:53:14.062374 kernel: io scheduler kyber registered Dec 13 01:53:14.062387 kernel: io scheduler bfq registered Dec 13 01:53:14.062400 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:53:14.062413 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:53:14.062426 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:53:14.062439 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 01:53:14.062452 kernel: i8042: PNP: No PS/2 controller found. Dec 13 01:53:14.062617 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 01:53:14.062741 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T01:53:13 UTC (1734054793) Dec 13 01:53:14.062844 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 01:53:14.062859 kernel: fail to initialize ptp_kvm Dec 13 01:53:14.062872 kernel: intel_pstate: CPU model not supported Dec 13 01:53:14.062885 kernel: efifb: probing for efifb Dec 13 01:53:14.062898 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 01:53:14.062911 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 01:53:14.062924 kernel: efifb: scrolling: redraw Dec 13 01:53:14.062940 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:53:14.062953 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:53:14.062967 kernel: fb0: EFI VGA frame buffer device Dec 13 01:53:14.062980 kernel: pstore: Registered efi as persistent store backend Dec 13 01:53:14.062993 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:53:14.063006 kernel: Segment Routing with IPv6 Dec 13 01:53:14.063019 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:53:14.063032 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:53:14.063046 kernel: Key type dns_resolver registered Dec 13 01:53:14.063061 kernel: IPI shorthand broadcast: enabled Dec 13 01:53:14.063074 kernel: sched_clock: Marking stable (754142600, 21201400)->(953719400, -178375400) Dec 13 01:53:14.063088 kernel: registered taskstats version 1 Dec 13 01:53:14.063101 kernel: Loading compiled-in X.509 certificates Dec 13 01:53:14.063114 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:53:14.063127 kernel: Key type .fscrypt registered Dec 13 01:53:14.063139 kernel: Key type fscrypt-provisioning registered Dec 13 01:53:14.063153 kernel: pstore: Using crash dump compression: deflate Dec 13 01:53:14.063168 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:53:14.063181 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:53:14.063194 kernel: ima: No architecture policies found Dec 13 01:53:14.063207 kernel: clk: Disabling unused clocks Dec 13 01:53:14.063220 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:53:14.063233 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:53:14.063246 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:53:14.063260 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:53:14.063273 kernel: Run /init as init process Dec 13 01:53:14.063286 kernel: with arguments: Dec 13 01:53:14.063301 kernel: /init Dec 13 01:53:14.063314 kernel: with environment: Dec 13 01:53:14.063327 kernel: HOME=/ Dec 13 01:53:14.063340 kernel: TERM=linux Dec 13 01:53:14.063352 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:53:14.063368 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:53:14.063384 systemd[1]: Detected virtualization microsoft. Dec 13 01:53:14.063400 systemd[1]: Detected architecture x86-64. Dec 13 01:53:14.063413 systemd[1]: Running in initrd. Dec 13 01:53:14.063426 systemd[1]: No hostname configured, using default hostname. Dec 13 01:53:14.063440 systemd[1]: Hostname set to . Dec 13 01:53:14.063454 systemd[1]: Initializing machine ID from random generator. Dec 13 01:53:14.063468 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:53:14.063481 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:53:14.063495 systemd[1]: Reached target cryptsetup.target. Dec 13 01:53:14.063508 systemd[1]: Reached target paths.target. Dec 13 01:53:14.063524 systemd[1]: Reached target slices.target. Dec 13 01:53:14.063538 systemd[1]: Reached target swap.target. Dec 13 01:53:14.063551 systemd[1]: Reached target timers.target. Dec 13 01:53:14.063566 systemd[1]: Listening on iscsid.socket. Dec 13 01:53:14.063579 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:53:14.063593 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:53:14.063607 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:53:14.063623 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:53:14.063637 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:53:14.063651 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:53:14.091730 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:53:14.091756 systemd[1]: Reached target sockets.target. Dec 13 01:53:14.091765 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:53:14.091774 systemd[1]: Finished network-cleanup.service. Dec 13 01:53:14.091786 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:53:14.091794 systemd[1]: Starting systemd-journald.service... Dec 13 01:53:14.091810 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:53:14.091818 systemd[1]: Starting systemd-resolved.service... Dec 13 01:53:14.091826 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:53:14.091835 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:53:14.091845 kernel: audit: type=1130 audit(1734054794.067:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.091856 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:53:14.091867 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:53:14.091881 systemd-journald[183]: Journal started Dec 13 01:53:14.091948 systemd-journald[183]: Runtime Journal (/run/log/journal/a1c619c6a1f34e86b5e13e0a215a9e41) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:53:14.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.035504 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 01:53:14.102383 systemd[1]: Started systemd-journald.service. Dec 13 01:53:14.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.113717 kernel: audit: type=1130 audit(1734054794.096:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.114221 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:53:14.119967 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:53:14.125143 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:53:14.126348 systemd-resolved[185]: Positive Trust Anchors: Dec 13 01:53:14.126362 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:53:14.126396 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:53:14.141500 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 01:53:14.162553 kernel: Bridge firewalling registered Dec 13 01:53:14.162576 kernel: audit: type=1130 audit(1734054794.113:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.162589 kernel: audit: type=1130 audit(1734054794.118:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.151222 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 01:53:14.178882 systemd[1]: Started systemd-resolved.service. Dec 13 01:53:14.182996 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:53:14.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.197835 kernel: audit: type=1130 audit(1734054794.182:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.199218 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:53:14.227173 kernel: audit: type=1130 audit(1734054794.198:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.227197 kernel: audit: type=1130 audit(1734054794.211:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.211844 systemd[1]: Reached target nss-lookup.target. Dec 13 01:53:14.225580 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:53:14.244584 dracut-cmdline[202]: dracut-dracut-053 Dec 13 01:53:14.247591 kernel: SCSI subsystem initialized Dec 13 01:53:14.248448 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:53:14.287777 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:53:14.287850 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:53:14.287867 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:53:14.297870 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 01:53:14.300712 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:53:14.321001 kernel: audit: type=1130 audit(1734054794.300:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.315685 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:53:14.325177 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:53:14.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.342690 kernel: audit: type=1130 audit(1734054794.327:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.342728 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:53:14.365680 kernel: iscsi: registered transport (tcp) Dec 13 01:53:14.392106 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:53:14.392183 kernel: QLogic iSCSI HBA Driver Dec 13 01:53:14.421780 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:53:14.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.424429 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:53:14.476689 kernel: raid6: avx512x4 gen() 18186 MB/s Dec 13 01:53:14.496675 kernel: raid6: avx512x4 xor() 7790 MB/s Dec 13 01:53:14.516673 kernel: raid6: avx512x2 gen() 17944 MB/s Dec 13 01:53:14.536679 kernel: raid6: avx512x2 xor() 27476 MB/s Dec 13 01:53:14.556672 kernel: raid6: avx512x1 gen() 18008 MB/s Dec 13 01:53:14.576671 kernel: raid6: avx512x1 xor() 25264 MB/s Dec 13 01:53:14.597673 kernel: raid6: avx2x4 gen() 17717 MB/s Dec 13 01:53:14.616670 kernel: raid6: avx2x4 xor() 7664 MB/s Dec 13 01:53:14.636669 kernel: raid6: avx2x2 gen() 18017 MB/s Dec 13 01:53:14.656672 kernel: raid6: avx2x2 xor() 21082 MB/s Dec 13 01:53:14.675671 kernel: raid6: avx2x1 gen() 13605 MB/s Dec 13 01:53:14.695668 kernel: raid6: avx2x1 xor() 18613 MB/s Dec 13 01:53:14.715669 kernel: raid6: sse2x4 gen() 11049 MB/s Dec 13 01:53:14.735671 kernel: raid6: sse2x4 xor() 6944 MB/s Dec 13 01:53:14.756669 kernel: raid6: sse2x2 gen() 11690 MB/s Dec 13 01:53:14.777670 kernel: raid6: sse2x2 xor() 7157 MB/s Dec 13 01:53:14.797669 kernel: raid6: sse2x1 gen() 10927 MB/s Dec 13 01:53:14.820726 kernel: raid6: sse2x1 xor() 5436 MB/s Dec 13 01:53:14.820753 kernel: raid6: using algorithm avx512x4 gen() 18186 MB/s Dec 13 01:53:14.820768 kernel: raid6: .... xor() 7790 MB/s, rmw enabled Dec 13 01:53:14.824056 kernel: raid6: using avx512x2 recovery algorithm Dec 13 01:53:14.843686 kernel: xor: automatically using best checksumming function avx Dec 13 01:53:14.940683 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:53:14.948633 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:53:14.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.952000 audit: BPF prog-id=7 op=LOAD Dec 13 01:53:14.952000 audit: BPF prog-id=8 op=LOAD Dec 13 01:53:14.953451 systemd[1]: Starting systemd-udevd.service... Dec 13 01:53:14.969198 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 01:53:14.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:14.973945 systemd[1]: Started systemd-udevd.service. Dec 13 01:53:14.977253 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:53:14.997905 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Dec 13 01:53:15.030130 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:53:15.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:15.035865 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:53:15.070274 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:53:15.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:15.128682 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:53:15.151604 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:53:15.151675 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 01:53:15.151689 kernel: AES CTR mode by8 optimization enabled Dec 13 01:53:15.172738 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 01:53:15.179782 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 01:53:15.192682 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 01:53:15.199883 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 01:53:15.203676 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 01:53:15.211545 kernel: scsi host0: storvsc_host_t Dec 13 01:53:15.211737 kernel: scsi host1: storvsc_host_t Dec 13 01:53:15.211766 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 01:53:15.216533 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 01:53:15.232435 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 01:53:15.232493 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 01:53:15.236689 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 01:53:15.265221 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 01:53:15.275830 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:53:15.275855 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 01:53:15.293130 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 01:53:15.293319 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 01:53:15.293494 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 01:53:15.293651 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 01:53:15.293823 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 01:53:15.293986 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:53:15.294015 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 01:53:15.336682 kernel: hv_netvsc 6045bddf-bea5-6045-bddf-bea56045bddf eth0: VF slot 1 added Dec 13 01:53:15.346677 kernel: hv_vmbus: registering driver hv_pci Dec 13 01:53:15.352691 kernel: hv_pci f9325571-7970-4f7c-a1c5-1c819810d606: PCI VMBus probing: Using version 0x10004 Dec 13 01:53:15.429085 kernel: hv_pci f9325571-7970-4f7c-a1c5-1c819810d606: PCI host bridge to bus 7970:00 Dec 13 01:53:15.429259 kernel: pci_bus 7970:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 01:53:15.429426 kernel: pci_bus 7970:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 01:53:15.429566 kernel: pci 7970:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 01:53:15.429756 kernel: pci 7970:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:53:15.429912 kernel: pci 7970:00:02.0: enabling Extended Tags Dec 13 01:53:15.430065 kernel: pci 7970:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7970:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 01:53:15.430216 kernel: pci_bus 7970:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 01:53:15.430362 kernel: pci 7970:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:53:15.521684 kernel: mlx5_core 7970:00:02.0: firmware version: 14.30.5000 Dec 13 01:53:15.784516 kernel: mlx5_core 7970:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 01:53:15.784726 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (436) Dec 13 01:53:15.784745 kernel: mlx5_core 7970:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 01:53:15.784902 kernel: mlx5_core 7970:00:02.0: mlx5e_tc_post_act_init:40:(pid 201): firmware level support is missing Dec 13 01:53:15.785060 kernel: hv_netvsc 6045bddf-bea5-6045-bddf-bea56045bddf eth0: VF registering: eth1 Dec 13 01:53:15.785215 kernel: mlx5_core 7970:00:02.0 eth1: joined to eth0 Dec 13 01:53:15.698016 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:53:15.736703 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:53:15.794896 kernel: mlx5_core 7970:00:02.0 enP31088s1: renamed from eth1 Dec 13 01:53:15.909046 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:53:15.914547 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:53:15.925433 systemd[1]: Starting disk-uuid.service... Dec 13 01:53:15.959961 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:53:16.943687 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:53:16.944381 disk-uuid[555]: The operation has completed successfully. Dec 13 01:53:17.016448 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:53:17.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.016551 systemd[1]: Finished disk-uuid.service. Dec 13 01:53:17.024323 systemd[1]: Starting verity-setup.service... Dec 13 01:53:17.065682 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 01:53:17.248272 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:53:17.253518 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:53:17.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.255551 systemd[1]: Finished verity-setup.service. Dec 13 01:53:17.329681 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:53:17.330350 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:53:17.334020 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:53:17.338492 systemd[1]: Starting ignition-setup.service... Dec 13 01:53:17.341551 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:53:17.359349 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:53:17.359391 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:53:17.359405 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:53:17.409641 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:53:17.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.414000 audit: BPF prog-id=9 op=LOAD Dec 13 01:53:17.414858 systemd[1]: Starting systemd-networkd.service... Dec 13 01:53:17.439382 systemd-networkd[824]: lo: Link UP Dec 13 01:53:17.439392 systemd-networkd[824]: lo: Gained carrier Dec 13 01:53:17.443071 systemd-networkd[824]: Enumeration completed Dec 13 01:53:17.444445 systemd[1]: Started systemd-networkd.service. Dec 13 01:53:17.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.448078 systemd[1]: Reached target network.target. Dec 13 01:53:17.449949 systemd[1]: Starting iscsiuio.service... Dec 13 01:53:17.453419 systemd-networkd[824]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:53:17.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.461524 systemd[1]: Started iscsiuio.service. Dec 13 01:53:17.471215 iscsid[834]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:53:17.471215 iscsid[834]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 01:53:17.471215 iscsid[834]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:53:17.471215 iscsid[834]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:53:17.471215 iscsid[834]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:53:17.471215 iscsid[834]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:53:17.471215 iscsid[834]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:53:17.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.464093 systemd[1]: Starting iscsid.service... Dec 13 01:53:17.471610 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:53:17.471988 systemd[1]: Started iscsid.service. Dec 13 01:53:17.477232 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:53:17.490086 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:53:17.495008 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:53:17.499815 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:53:17.501985 systemd[1]: Reached target remote-fs.target. Dec 13 01:53:17.528541 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:53:17.536943 kernel: mlx5_core 7970:00:02.0 enP31088s1: Link up Dec 13 01:53:17.541534 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:53:17.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.582988 kernel: hv_netvsc 6045bddf-bea5-6045-bddf-bea56045bddf eth0: Data path switched to VF: enP31088s1 Dec 13 01:53:17.583256 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:53:17.583747 systemd-networkd[824]: enP31088s1: Link UP Dec 13 01:53:17.585694 systemd-networkd[824]: eth0: Link UP Dec 13 01:53:17.585905 systemd-networkd[824]: eth0: Gained carrier Dec 13 01:53:17.590832 systemd-networkd[824]: enP31088s1: Gained carrier Dec 13 01:53:17.625765 systemd-networkd[824]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:53:17.682650 systemd[1]: Finished ignition-setup.service. Dec 13 01:53:17.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.685925 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:53:18.985869 systemd-networkd[824]: eth0: Gained IPv6LL Dec 13 01:53:21.051514 ignition[849]: Ignition 2.14.0 Dec 13 01:53:21.051532 ignition[849]: Stage: fetch-offline Dec 13 01:53:21.051632 ignition[849]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:21.051704 ignition[849]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:21.153263 ignition[849]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:21.153495 ignition[849]: parsed url from cmdline: "" Dec 13 01:53:21.154862 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:53:21.173225 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 01:53:21.173277 kernel: audit: type=1130 audit(1734054801.160:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.153500 ignition[849]: no config URL provided Dec 13 01:53:21.161865 systemd[1]: Starting ignition-fetch.service... Dec 13 01:53:21.153511 ignition[849]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:53:21.153521 ignition[849]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:53:21.153528 ignition[849]: failed to fetch config: resource requires networking Dec 13 01:53:21.153826 ignition[849]: Ignition finished successfully Dec 13 01:53:21.170751 ignition[855]: Ignition 2.14.0 Dec 13 01:53:21.170757 ignition[855]: Stage: fetch Dec 13 01:53:21.170875 ignition[855]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:21.170901 ignition[855]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:21.176464 ignition[855]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:21.176783 ignition[855]: parsed url from cmdline: "" Dec 13 01:53:21.176793 ignition[855]: no config URL provided Dec 13 01:53:21.176801 ignition[855]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:53:21.176827 ignition[855]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:53:21.176881 ignition[855]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 01:53:21.254493 ignition[855]: GET result: OK Dec 13 01:53:21.254583 ignition[855]: config has been read from IMDS userdata Dec 13 01:53:21.254612 ignition[855]: parsing config with SHA512: f48ee3dbf14323a2ef611dfe30176001867d9497d843a37bd0a7a38c5e384b97b30c5df251f86d54c99b036b7883439c0ec36ced553d8d606a5b67fb2a406456 Dec 13 01:53:21.260332 unknown[855]: fetched base config from "system" Dec 13 01:53:21.260345 unknown[855]: fetched base config from "system" Dec 13 01:53:21.260354 unknown[855]: fetched user config from "azure" Dec 13 01:53:21.264738 ignition[855]: fetch: fetch complete Dec 13 01:53:21.264748 ignition[855]: fetch: fetch passed Dec 13 01:53:21.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.267886 systemd[1]: Finished ignition-fetch.service. Dec 13 01:53:21.291437 kernel: audit: type=1130 audit(1734054801.270:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.266608 ignition[855]: Ignition finished successfully Dec 13 01:53:21.271514 systemd[1]: Starting ignition-kargs.service... Dec 13 01:53:21.295230 ignition[861]: Ignition 2.14.0 Dec 13 01:53:21.295238 ignition[861]: Stage: kargs Dec 13 01:53:21.295345 ignition[861]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:21.295368 ignition[861]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:21.298211 ignition[861]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:21.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.303612 systemd[1]: Finished ignition-kargs.service. Dec 13 01:53:21.322822 kernel: audit: type=1130 audit(1734054801.305:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.301576 ignition[861]: kargs: kargs passed Dec 13 01:53:21.318833 systemd[1]: Starting ignition-disks.service... Dec 13 01:53:21.301628 ignition[861]: Ignition finished successfully Dec 13 01:53:21.326477 ignition[867]: Ignition 2.14.0 Dec 13 01:53:21.326484 ignition[867]: Stage: disks Dec 13 01:53:21.326592 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:21.332407 systemd[1]: Finished ignition-disks.service. Dec 13 01:53:21.350747 kernel: audit: type=1130 audit(1734054801.339:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.326614 ignition[867]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:21.339258 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:53:21.329799 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:21.331626 ignition[867]: disks: disks passed Dec 13 01:53:21.355185 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:53:21.331681 ignition[867]: Ignition finished successfully Dec 13 01:53:21.361407 systemd[1]: Reached target local-fs.target. Dec 13 01:53:21.368827 systemd[1]: Reached target sysinit.target. Dec 13 01:53:21.372457 systemd[1]: Reached target basic.target. Dec 13 01:53:21.376926 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:53:21.444002 systemd-fsck[875]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 01:53:21.454106 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:53:21.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.467833 systemd[1]: Mounting sysroot.mount... Dec 13 01:53:21.474238 kernel: audit: type=1130 audit(1734054801.455:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:21.486677 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:53:21.486907 systemd[1]: Mounted sysroot.mount. Dec 13 01:53:21.490466 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:53:21.522934 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:53:21.528388 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 01:53:21.533360 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:53:21.533415 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:53:21.542780 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:53:21.601210 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:53:21.609870 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:53:21.620788 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (886) Dec 13 01:53:21.629480 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:53:21.629527 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:53:21.629541 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:53:21.636813 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:53:21.641354 initrd-setup-root[891]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:53:21.670639 initrd-setup-root[917]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:53:21.691758 initrd-setup-root[925]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:53:21.696465 initrd-setup-root[933]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:53:22.263494 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:53:22.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:22.268879 systemd[1]: Starting ignition-mount.service... Dec 13 01:53:22.288733 kernel: audit: type=1130 audit(1734054802.267:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:22.283498 systemd[1]: Starting sysroot-boot.service... Dec 13 01:53:22.286335 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 01:53:22.286449 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 01:53:22.308422 ignition[953]: INFO : Ignition 2.14.0 Dec 13 01:53:22.308422 ignition[953]: INFO : Stage: mount Dec 13 01:53:22.312592 ignition[953]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:22.312592 ignition[953]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:22.326199 ignition[953]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:22.326653 systemd[1]: Finished sysroot-boot.service. Dec 13 01:53:22.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:22.334423 ignition[953]: INFO : mount: mount passed Dec 13 01:53:22.348028 kernel: audit: type=1130 audit(1734054802.332:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:22.348052 ignition[953]: INFO : Ignition finished successfully Dec 13 01:53:22.335807 systemd[1]: Finished ignition-mount.service. Dec 13 01:53:22.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:22.364672 kernel: audit: type=1130 audit(1734054802.351:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:22.935495 coreos-metadata[885]: Dec 13 01:53:22.935 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 01:53:22.971547 coreos-metadata[885]: Dec 13 01:53:22.971 INFO Fetch successful Dec 13 01:53:23.007394 coreos-metadata[885]: Dec 13 01:53:23.007 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 01:53:23.023085 coreos-metadata[885]: Dec 13 01:53:23.023 INFO Fetch successful Dec 13 01:53:23.050398 coreos-metadata[885]: Dec 13 01:53:23.050 INFO wrote hostname ci-3510.3.6-a-e23a6f90f8 to /sysroot/etc/hostname Dec 13 01:53:23.052757 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 01:53:23.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:23.059805 systemd[1]: Starting ignition-files.service... Dec 13 01:53:23.072508 kernel: audit: type=1130 audit(1734054803.058:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:23.078003 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:53:23.091674 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (964) Dec 13 01:53:23.100624 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:53:23.100680 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:53:23.100702 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:53:23.109066 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:53:23.121817 ignition[983]: INFO : Ignition 2.14.0 Dec 13 01:53:23.121817 ignition[983]: INFO : Stage: files Dec 13 01:53:23.125732 ignition[983]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:23.125732 ignition[983]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:23.139094 ignition[983]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:23.156409 ignition[983]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:53:23.159650 ignition[983]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:53:23.159650 ignition[983]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:53:23.233675 ignition[983]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:53:23.237383 ignition[983]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:53:23.237383 ignition[983]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:53:23.234310 unknown[983]: wrote ssh authorized keys file for user: core Dec 13 01:53:23.249998 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 01:53:23.254587 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 01:53:23.254587 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:53:23.254587 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:53:23.289012 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:53:23.294179 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:53:23.294179 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:53:23.294179 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:53:23.294179 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:53:23.294179 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:53:23.325594 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (983) Dec 13 01:53:23.311193 systemd[1]: mnt-oem3640889037.mount: Deactivated successfully. Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640889037" Dec 13 01:53:23.328280 ignition[983]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640889037": device or resource busy Dec 13 01:53:23.328280 ignition[983]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3640889037", trying btrfs: device or resource busy Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640889037" Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640889037" Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem3640889037" Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem3640889037" Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2301634306" Dec 13 01:53:23.328280 ignition[983]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2301634306": device or resource busy Dec 13 01:53:23.328280 ignition[983]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2301634306", trying btrfs: device or resource busy Dec 13 01:53:23.328280 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2301634306" Dec 13 01:53:23.398516 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2301634306" Dec 13 01:53:23.398516 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem2301634306" Dec 13 01:53:23.398516 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2301634306" Dec 13 01:53:23.398516 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:53:23.398516 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:53:23.398516 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 01:53:23.329744 systemd[1]: mnt-oem2301634306.mount: Deactivated successfully. Dec 13 01:53:23.903930 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Dec 13 01:53:24.312106 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:53:24.312106 ignition[983]: INFO : files: op(10): [started] processing unit "waagent.service" Dec 13 01:53:24.312106 ignition[983]: INFO : files: op(10): [finished] processing unit "waagent.service" Dec 13 01:53:24.312106 ignition[983]: INFO : files: op(11): [started] processing unit "nvidia.service" Dec 13 01:53:24.312106 ignition[983]: INFO : files: op(11): [finished] processing unit "nvidia.service" Dec 13 01:53:24.312106 ignition[983]: INFO : files: op(12): [started] processing unit "containerd.service" Dec 13 01:53:24.351007 kernel: audit: type=1130 audit(1734054804.328:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(12): op(13): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(12): op(13): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(12): [finished] processing unit "containerd.service" Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(14): [started] setting preset to enabled for "waagent.service" Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(14): [finished] setting preset to enabled for "waagent.service" Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(15): [started] setting preset to enabled for "nvidia.service" Dec 13 01:53:24.351126 ignition[983]: INFO : files: op(15): [finished] setting preset to enabled for "nvidia.service" Dec 13 01:53:24.351126 ignition[983]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:53:24.351126 ignition[983]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:53:24.351126 ignition[983]: INFO : files: files passed Dec 13 01:53:24.351126 ignition[983]: INFO : Ignition finished successfully Dec 13 01:53:24.324989 systemd[1]: Finished ignition-files.service. Dec 13 01:53:24.334637 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:53:24.346078 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:53:24.346972 systemd[1]: Starting ignition-quench.service... Dec 13 01:53:24.353171 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:53:24.353283 systemd[1]: Finished ignition-quench.service. Dec 13 01:53:24.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.408935 initrd-setup-root-after-ignition[1009]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:53:24.413318 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:53:24.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.418506 systemd[1]: Reached target ignition-complete.target. Dec 13 01:53:24.423555 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:53:24.437826 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:53:24.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.437909 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:53:24.440096 systemd[1]: Reached target initrd-fs.target. Dec 13 01:53:24.444698 systemd[1]: Reached target initrd.target. Dec 13 01:53:24.446543 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:53:24.447488 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:53:24.464651 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:53:24.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.469531 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:53:24.479630 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:53:24.483460 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:53:24.487791 systemd[1]: Stopped target timers.target. Dec 13 01:53:24.491941 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:53:24.492073 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:53:24.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.498998 systemd[1]: Stopped target initrd.target. Dec 13 01:53:24.502743 systemd[1]: Stopped target basic.target. Dec 13 01:53:24.506419 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:53:24.510813 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:53:24.515057 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:53:24.519555 systemd[1]: Stopped target remote-fs.target. Dec 13 01:53:24.523656 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:53:24.527759 systemd[1]: Stopped target sysinit.target. Dec 13 01:53:24.531587 systemd[1]: Stopped target local-fs.target. Dec 13 01:53:24.535398 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:53:24.539788 systemd[1]: Stopped target swap.target. Dec 13 01:53:24.543768 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:53:24.546150 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:53:24.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.550159 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:53:24.554031 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:53:24.556401 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:53:24.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.560389 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:53:24.563096 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:53:24.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.567737 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:53:24.570287 systemd[1]: Stopped ignition-files.service. Dec 13 01:53:24.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.574149 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 01:53:24.576766 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 01:53:24.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.591723 iscsid[834]: iscsid shutting down. Dec 13 01:53:24.582137 systemd[1]: Stopping ignition-mount.service... Dec 13 01:53:24.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.595621 ignition[1022]: INFO : Ignition 2.14.0 Dec 13 01:53:24.595621 ignition[1022]: INFO : Stage: umount Dec 13 01:53:24.595621 ignition[1022]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:53:24.595621 ignition[1022]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:53:24.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.584399 systemd[1]: Stopping iscsid.service... Dec 13 01:53:24.618121 ignition[1022]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:53:24.618121 ignition[1022]: INFO : umount: umount passed Dec 13 01:53:24.618121 ignition[1022]: INFO : Ignition finished successfully Dec 13 01:53:24.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.587403 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:53:24.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.589416 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:53:24.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.589628 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:53:24.595432 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:53:24.595599 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:53:24.601634 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:53:24.601788 systemd[1]: Stopped iscsid.service. Dec 13 01:53:24.614546 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:53:24.614653 systemd[1]: Stopped ignition-mount.service. Dec 13 01:53:24.623453 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:53:24.623590 systemd[1]: Stopped ignition-disks.service. Dec 13 01:53:24.627964 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:53:24.628019 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:53:24.631880 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 01:53:24.634048 systemd[1]: Stopped ignition-fetch.service. Dec 13 01:53:24.637743 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:53:24.637797 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:53:24.642403 systemd[1]: Stopped target paths.target. Dec 13 01:53:24.646163 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:53:24.655563 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:53:24.661531 systemd[1]: Stopped target slices.target. Dec 13 01:53:24.686786 systemd[1]: Stopped target sockets.target. Dec 13 01:53:24.689114 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:53:24.689172 systemd[1]: Closed iscsid.socket. Dec 13 01:53:24.692889 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:53:24.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.694893 systemd[1]: Stopped ignition-setup.service. Dec 13 01:53:24.701880 systemd[1]: Stopping iscsiuio.service... Dec 13 01:53:24.708559 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:53:24.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.709200 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:53:24.709307 systemd[1]: Stopped iscsiuio.service. Dec 13 01:53:24.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.713547 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:53:24.713639 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:53:24.723946 systemd[1]: Stopped target network.target. Dec 13 01:53:24.727640 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:53:24.727710 systemd[1]: Closed iscsiuio.socket. Dec 13 01:53:24.733249 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:53:24.736942 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:53:24.737709 systemd-networkd[824]: eth0: DHCPv6 lease lost Dec 13 01:53:24.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.740888 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:53:24.740992 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:53:24.749857 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:53:24.752239 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:53:24.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.756000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:53:24.756000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:53:24.756594 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:53:24.756629 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:53:24.759307 systemd[1]: Stopping network-cleanup.service... Dec 13 01:53:24.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.764718 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:53:24.764796 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:53:24.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.768766 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:53:24.768821 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:53:24.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.775338 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:53:24.777516 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:53:24.784178 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:53:24.790815 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:53:24.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.791375 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:53:24.791487 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:53:24.799709 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:53:24.799767 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:53:24.804954 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:53:24.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.804987 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:53:24.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.809033 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:53:24.809085 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:53:24.813517 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:53:24.813565 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:53:24.815608 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:53:24.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.815650 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:53:24.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.820330 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:53:24.830078 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 01:53:24.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.830147 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 01:53:24.835001 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:53:24.857893 kernel: hv_netvsc 6045bddf-bea5-6045-bddf-bea56045bddf eth0: Data path switched from VF: enP31088s1 Dec 13 01:53:24.835043 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:53:24.838974 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:53:24.839027 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:53:24.844531 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 01:53:24.845072 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:53:24.845177 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:53:24.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.874178 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:53:24.874270 systemd[1]: Stopped network-cleanup.service. Dec 13 01:53:24.989084 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:53:24.989218 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:53:24.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:24.995686 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:53:24.999912 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:53:24.999990 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:53:25.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:25.005329 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:53:25.209742 systemd[1]: Switching root. Dec 13 01:53:25.212000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:53:25.212000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:53:25.212000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:53:25.213000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:53:25.213000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:53:25.234088 systemd-journald[183]: Journal stopped Dec 13 01:53:43.806272 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 01:53:43.806299 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:53:43.806313 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:53:43.806322 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:53:43.806333 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:53:43.806342 kernel: SELinux: policy capability open_perms=1 Dec 13 01:53:43.806355 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:53:43.806366 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:53:43.806377 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:53:43.806386 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:53:43.806397 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:53:43.806406 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:53:43.806416 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 01:53:43.806429 kernel: audit: type=1403 audit(1734054809.372:88): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:53:43.806444 systemd[1]: Successfully loaded SELinux policy in 371.724ms. Dec 13 01:53:43.806459 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.224ms. Dec 13 01:53:43.806474 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:53:43.806487 systemd[1]: Detected virtualization microsoft. Dec 13 01:53:43.806504 systemd[1]: Detected architecture x86-64. Dec 13 01:53:43.806518 systemd[1]: Detected first boot. Dec 13 01:53:43.806532 systemd[1]: Hostname set to . Dec 13 01:53:43.806547 systemd[1]: Initializing machine ID from random generator. Dec 13 01:53:43.806562 kernel: audit: type=1400 audit(1734054810.245:89): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:53:43.806577 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:53:43.806593 kernel: audit: type=1400 audit(1734054812.324:90): avc: denied { associate } for pid=1072 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:53:43.806615 kernel: audit: type=1300 audit(1734054812.324:90): arch=c000003e syscall=188 success=yes exit=0 a0=c00018a1f2 a1=c000194258 a2=c000196400 a3=32 items=0 ppid=1055 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:43.806629 kernel: audit: type=1327 audit(1734054812.324:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:53:43.806643 kernel: audit: type=1400 audit(1734054812.331:91): avc: denied { associate } for pid=1072 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:53:43.806669 kernel: audit: type=1300 audit(1734054812.331:91): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018a2c9 a2=1ed a3=0 items=2 ppid=1055 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:43.806685 kernel: audit: type=1307 audit(1734054812.331:91): cwd="/" Dec 13 01:53:43.806699 kernel: audit: type=1302 audit(1734054812.331:91): item=0 name=(null) inode=2 dev=00:29 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:43.806719 kernel: audit: type=1302 audit(1734054812.331:91): item=1 name=(null) inode=3 dev=00:29 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:43.806737 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:53:43.806756 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:53:43.806775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:53:43.806795 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:53:43.806813 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:53:43.806831 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:53:43.806849 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:53:43.806861 systemd[1]: Created slice system-getty.slice. Dec 13 01:53:43.806876 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:53:43.806887 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:53:43.806900 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:53:43.806911 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:53:43.806922 systemd[1]: Created slice user.slice. Dec 13 01:53:43.806934 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:53:43.806946 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:53:43.806958 systemd[1]: Set up automount boot.automount. Dec 13 01:53:43.806970 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:53:43.806980 systemd[1]: Reached target integritysetup.target. Dec 13 01:53:43.806993 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:53:43.807004 systemd[1]: Reached target remote-fs.target. Dec 13 01:53:43.807014 systemd[1]: Reached target slices.target. Dec 13 01:53:43.807026 systemd[1]: Reached target swap.target. Dec 13 01:53:43.807037 systemd[1]: Reached target torcx.target. Dec 13 01:53:43.807051 systemd[1]: Reached target veritysetup.target. Dec 13 01:53:43.807061 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:53:43.807072 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:53:43.807085 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:53:43.807094 kernel: audit: type=1400 audit(1734054823.458:92): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:53:43.807106 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:53:43.807118 kernel: audit: type=1335 audit(1734054823.458:93): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 01:53:43.807129 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:53:43.807143 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:53:43.807155 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:53:43.807164 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:53:43.807176 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:53:43.807188 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:53:43.807201 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:53:43.807214 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:53:43.807225 systemd[1]: Mounting media.mount... Dec 13 01:53:43.807236 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:43.807247 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:53:43.807259 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:53:43.807271 systemd[1]: Mounting tmp.mount... Dec 13 01:53:43.807284 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:53:43.807296 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:43.807307 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:53:43.807318 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:53:43.807329 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:43.807342 systemd[1]: Starting modprobe@drm.service... Dec 13 01:53:43.807352 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:53:43.807364 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:53:43.807377 systemd[1]: Starting modprobe@loop.service... Dec 13 01:53:43.807390 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:53:43.807402 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 01:53:43.807415 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 01:53:43.807425 systemd[1]: Starting systemd-journald.service... Dec 13 01:53:43.807438 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:53:43.807450 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:53:43.807460 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:53:43.807472 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:53:43.807487 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:43.807497 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:53:43.807509 kernel: loop: module loaded Dec 13 01:53:43.807520 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:53:43.807530 systemd[1]: Mounted media.mount. Dec 13 01:53:43.807541 kernel: fuse: init (API version 7.34) Dec 13 01:53:43.807551 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:53:43.807564 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:53:43.807573 systemd[1]: Mounted tmp.mount. Dec 13 01:53:43.807585 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:53:43.807600 kernel: audit: type=1130 audit(1734054823.788:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.807610 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:53:43.807622 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:53:43.807640 systemd-journald[1188]: Journal started Dec 13 01:53:43.821548 systemd-journald[1188]: Runtime Journal (/run/log/journal/c2379701817647d395aa9be3813a9490) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:53:43.821609 kernel: audit: type=1305 audit(1734054823.800:95): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:53:43.821637 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:53:43.458000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 01:53:43.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.800000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:53:43.834357 systemd[1]: Started systemd-journald.service. Dec 13 01:53:43.834393 kernel: audit: type=1300 audit(1734054823.800:95): arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc89d01b40 a2=4000 a3=7ffc89d01bdc items=0 ppid=1 pid=1188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:43.800000 audit[1188]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc89d01b40 a2=4000 a3=7ffc89d01bdc items=0 ppid=1 pid=1188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:43.834228 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:43.860556 kernel: audit: type=1327 audit(1734054823.800:95): proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:53:43.800000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:53:43.856876 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:43.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.863739 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:53:43.863919 systemd[1]: Finished modprobe@drm.service. Dec 13 01:53:43.888394 kernel: audit: type=1130 audit(1734054823.806:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.888450 kernel: audit: type=1130 audit(1734054823.826:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.888804 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:53:43.888987 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:53:43.900511 kernel: audit: type=1131 audit(1734054823.826:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.900578 kernel: audit: type=1130 audit(1734054823.833:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.916104 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:53:43.916306 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:53:43.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.918607 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:53:43.918788 systemd[1]: Finished modprobe@loop.service. Dec 13 01:53:43.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.921386 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:53:43.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.924177 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:53:43.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.927028 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:53:43.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.929568 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:53:43.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.932270 systemd[1]: Reached target network-pre.target. Dec 13 01:53:43.936404 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:53:43.941097 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:53:43.943048 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:53:43.947508 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:53:43.951306 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:53:43.953675 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:53:43.956414 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:53:43.958949 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:53:43.960074 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:53:43.963321 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:53:43.966845 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:53:43.975194 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:53:43.977911 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:53:43.983905 udevadm[1224]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 01:53:43.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:43.986971 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:53:43.989427 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:53:44.001836 systemd-journald[1188]: Time spent on flushing to /var/log/journal/c2379701817647d395aa9be3813a9490 is 19.871ms for 1086 entries. Dec 13 01:53:44.001836 systemd-journald[1188]: System Journal (/var/log/journal/c2379701817647d395aa9be3813a9490) is 8.0M, max 2.6G, 2.6G free. Dec 13 01:53:44.070178 systemd-journald[1188]: Received client request to flush runtime journal. Dec 13 01:53:44.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:44.012773 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:53:44.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:44.071383 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:53:44.731257 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:53:44.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:44.735786 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:53:45.118272 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:53:45.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:45.366232 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:53:45.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:45.370202 systemd[1]: Starting systemd-udevd.service... Dec 13 01:53:45.390169 systemd-udevd[1236]: Using default interface naming scheme 'v252'. Dec 13 01:53:45.720070 systemd[1]: Started systemd-udevd.service. Dec 13 01:53:45.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:45.724991 systemd[1]: Starting systemd-networkd.service... Dec 13 01:53:45.758976 systemd[1]: Found device dev-ttyS0.device. Dec 13 01:53:45.835000 audit[1237]: AVC avc: denied { confidentiality } for pid=1237 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:53:45.849676 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:53:45.872015 kernel: hv_vmbus: registering driver hv_balloon Dec 13 01:53:45.883404 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 01:53:45.883477 kernel: hv_vmbus: registering driver hv_utils Dec 13 01:53:45.883496 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 01:53:45.681097 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 01:53:45.787796 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 01:53:45.787837 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 01:53:45.787856 systemd-journald[1188]: Time jumped backwards, rotating. Dec 13 01:53:45.787941 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 01:53:45.787962 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 01:53:45.788008 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 01:53:45.788030 kernel: Console: switching to colour dummy device 80x25 Dec 13 01:53:45.788049 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:53:45.835000 audit[1237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563fe1586c20 a1=f884 a2=7fb188b33bc5 a3=5 items=12 ppid=1236 pid=1237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:45.835000 audit: CWD cwd="/" Dec 13 01:53:45.835000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=1 name=(null) inode=14834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=2 name=(null) inode=14834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=3 name=(null) inode=14835 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=4 name=(null) inode=14834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=5 name=(null) inode=14836 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=6 name=(null) inode=14834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=7 name=(null) inode=14837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=8 name=(null) inode=14834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=9 name=(null) inode=14838 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=10 name=(null) inode=14834 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PATH item=11 name=(null) inode=14839 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:53:45.835000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:53:45.690824 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:53:45.789940 systemd[1]: Started systemd-userdbd.service. Dec 13 01:53:45.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:45.911017 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1237) Dec 13 01:53:46.010664 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Dec 13 01:53:46.054002 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 01:53:46.105493 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:53:46.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:46.110218 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:53:46.334215 systemd-networkd[1242]: lo: Link UP Dec 13 01:53:46.334226 systemd-networkd[1242]: lo: Gained carrier Dec 13 01:53:46.334818 systemd-networkd[1242]: Enumeration completed Dec 13 01:53:46.335021 systemd[1]: Started systemd-networkd.service. Dec 13 01:53:46.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:46.338638 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:53:46.385191 systemd-networkd[1242]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:53:46.438998 kernel: mlx5_core 7970:00:02.0 enP31088s1: Link up Dec 13 01:53:46.463992 kernel: hv_netvsc 6045bddf-bea5-6045-bddf-bea56045bddf eth0: Data path switched to VF: enP31088s1 Dec 13 01:53:46.464942 systemd-networkd[1242]: enP31088s1: Link UP Dec 13 01:53:46.465175 systemd-networkd[1242]: eth0: Link UP Dec 13 01:53:46.465190 systemd-networkd[1242]: eth0: Gained carrier Dec 13 01:53:46.469288 systemd-networkd[1242]: enP31088s1: Gained carrier Dec 13 01:53:46.505116 systemd-networkd[1242]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:53:46.555919 lvm[1314]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:53:46.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:46.586236 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:53:46.589645 systemd[1]: Reached target cryptsetup.target. Dec 13 01:53:46.593063 systemd[1]: Starting lvm2-activation.service... Dec 13 01:53:46.597806 lvm[1318]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:53:46.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:46.617087 systemd[1]: Finished lvm2-activation.service. Dec 13 01:53:46.619920 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:53:46.622615 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:53:46.622647 systemd[1]: Reached target local-fs.target. Dec 13 01:53:46.624890 systemd[1]: Reached target machines.target. Dec 13 01:53:46.628318 systemd[1]: Starting ldconfig.service... Dec 13 01:53:46.630481 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:46.630571 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:46.631709 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:53:46.634840 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:53:46.638666 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:53:46.642127 systemd[1]: Starting systemd-sysext.service... Dec 13 01:53:46.973434 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1321 (bootctl) Dec 13 01:53:46.975062 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:53:47.137429 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:53:47.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.140443 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:53:47.146710 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:53:47.147170 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:53:47.187990 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 01:53:47.218999 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:53:47.235001 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 01:53:47.238888 (sd-sysext)[1337]: Using extensions 'kubernetes'. Dec 13 01:53:47.239451 (sd-sysext)[1337]: Merged extensions into '/usr'. Dec 13 01:53:47.259997 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:53:47.261503 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:53:47.263168 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:47.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.265349 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:53:47.266784 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.271750 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:47.276128 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:53:47.280422 systemd[1]: Starting modprobe@loop.service... Dec 13 01:53:47.286112 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.286284 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:47.286448 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:47.290482 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:53:47.292957 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:47.293168 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:47.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.304153 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:53:47.304329 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:53:47.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.305609 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:53:47.305783 systemd[1]: Finished modprobe@loop.service. Dec 13 01:53:47.307539 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:53:47.307638 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.308857 systemd[1]: Finished systemd-sysext.service. Dec 13 01:53:47.312426 systemd[1]: Starting ensure-sysext.service... Dec 13 01:53:47.316101 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:53:47.330654 systemd[1]: Reloading. Dec 13 01:53:47.336110 systemd-tmpfiles[1353]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:53:47.390672 /usr/lib/systemd/system-generators/torcx-generator[1373]: time="2024-12-13T01:53:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:53:47.391169 /usr/lib/systemd/system-generators/torcx-generator[1373]: time="2024-12-13T01:53:47Z" level=info msg="torcx already run" Dec 13 01:53:47.402378 systemd-tmpfiles[1353]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:53:47.419357 systemd-tmpfiles[1353]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:53:47.499940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:53:47.499962 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:53:47.517996 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:53:47.594146 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:47.594440 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.595736 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:47.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.598344 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:53:47.601166 systemd[1]: Starting modprobe@loop.service... Dec 13 01:53:47.602222 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.602429 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:47.602629 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:47.604075 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:47.604300 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:47.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.608088 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:53:47.608283 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:53:47.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.614187 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:53:47.614432 systemd[1]: Finished modprobe@loop.service. Dec 13 01:53:47.617114 systemd[1]: Finished ensure-sysext.service. Dec 13 01:53:47.621890 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:47.623684 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.627245 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:53:47.638419 systemd[1]: Starting modprobe@drm.service... Dec 13 01:53:47.641951 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:53:47.644315 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.644497 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:47.644733 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:53:47.645610 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:53:47.645917 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:53:47.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.648692 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:53:47.648886 systemd[1]: Finished modprobe@drm.service. Dec 13 01:53:47.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.651887 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:53:47.652206 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:53:47.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:47.654855 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:53:47.655022 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:53:47.695097 systemd-networkd[1242]: eth0: Gained IPv6LL Dec 13 01:53:47.699069 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:53:47.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:48.024085 systemd-fsck[1334]: fsck.fat 4.2 (2021-01-31) Dec 13 01:53:48.024085 systemd-fsck[1334]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 01:53:48.026737 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:53:48.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:48.031680 systemd[1]: Mounting boot.mount... Dec 13 01:53:48.050774 systemd[1]: Mounted boot.mount. Dec 13 01:53:48.064603 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:53:48.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.105205 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:53:49.109620 systemd[1]: Starting audit-rules.service... Dec 13 01:53:49.125389 kernel: kauditd_printk_skb: 67 callbacks suppressed Dec 13 01:53:49.125508 kernel: audit: type=1130 audit(1734054829.106:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.126902 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:53:49.131883 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:53:49.138289 systemd[1]: Starting systemd-resolved.service... Dec 13 01:53:49.142218 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:53:49.148112 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:53:49.154541 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:53:49.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.157550 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:53:49.167994 kernel: audit: type=1130 audit(1734054829.155:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.177000 audit[1473]: SYSTEM_BOOT pid=1473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.180387 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:53:49.189993 kernel: audit: type=1127 audit(1734054829.177:154): pid=1473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.201992 kernel: audit: type=1130 audit(1734054829.189:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.317183 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:53:49.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.320187 systemd[1]: Reached target time-set.target. Dec 13 01:53:49.332025 kernel: audit: type=1130 audit(1734054829.319:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.404555 systemd-resolved[1470]: Positive Trust Anchors: Dec 13 01:53:49.404574 systemd-resolved[1470]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:53:49.404612 systemd-resolved[1470]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:53:49.505124 systemd-resolved[1470]: Using system hostname 'ci-3510.3.6-a-e23a6f90f8'. Dec 13 01:53:49.506822 systemd[1]: Started systemd-resolved.service. Dec 13 01:53:49.509228 systemd[1]: Reached target network.target. Dec 13 01:53:49.524209 kernel: audit: type=1130 audit(1734054829.508:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.524348 systemd[1]: Reached target network-online.target. Dec 13 01:53:49.526561 systemd[1]: Reached target nss-lookup.target. Dec 13 01:53:49.543203 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:53:49.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.560049 kernel: audit: type=1130 audit(1734054829.545:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:49.582072 systemd-timesyncd[1472]: Contacted time server 193.1.12.167:123 (0.flatcar.pool.ntp.org). Dec 13 01:53:49.582158 systemd-timesyncd[1472]: Initial clock synchronization to Fri 2024-12-13 01:53:49.581145 UTC. Dec 13 01:53:49.593000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:53:49.595116 augenrules[1490]: No rules Dec 13 01:53:49.600701 systemd[1]: Finished audit-rules.service. Dec 13 01:53:49.593000 audit[1490]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff0a65db50 a2=420 a3=0 items=0 ppid=1467 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:49.630001 kernel: audit: type=1305 audit(1734054829.593:159): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:53:49.630091 kernel: audit: type=1300 audit(1734054829.593:159): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff0a65db50 a2=420 a3=0 items=0 ppid=1467 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:49.630133 kernel: audit: type=1327 audit(1734054829.593:159): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:53:49.593000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:53:55.911843 ldconfig[1320]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:53:55.927194 systemd[1]: Finished ldconfig.service. Dec 13 01:53:55.931517 systemd[1]: Starting systemd-update-done.service... Dec 13 01:53:55.954732 systemd[1]: Finished systemd-update-done.service. Dec 13 01:53:55.957496 systemd[1]: Reached target sysinit.target. Dec 13 01:53:55.959703 systemd[1]: Started motdgen.path. Dec 13 01:53:55.961616 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:53:55.964474 systemd[1]: Started logrotate.timer. Dec 13 01:53:55.966304 systemd[1]: Started mdadm.timer. Dec 13 01:53:55.967939 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:53:55.970032 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:53:55.970065 systemd[1]: Reached target paths.target. Dec 13 01:53:55.972238 systemd[1]: Reached target timers.target. Dec 13 01:53:55.974719 systemd[1]: Listening on dbus.socket. Dec 13 01:53:55.977778 systemd[1]: Starting docker.socket... Dec 13 01:53:55.981299 systemd[1]: Listening on sshd.socket. Dec 13 01:53:55.983599 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:55.984249 systemd[1]: Listening on docker.socket. Dec 13 01:53:55.986279 systemd[1]: Reached target sockets.target. Dec 13 01:53:55.988572 systemd[1]: Reached target basic.target. Dec 13 01:53:55.990699 systemd[1]: System is tainted: cgroupsv1 Dec 13 01:53:55.990761 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:53:55.990794 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:53:55.991957 systemd[1]: Starting containerd.service... Dec 13 01:53:55.995685 systemd[1]: Starting dbus.service... Dec 13 01:53:55.999012 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:53:56.002395 systemd[1]: Starting extend-filesystems.service... Dec 13 01:53:56.004751 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:53:56.021176 systemd[1]: Starting kubelet.service... Dec 13 01:53:56.024819 systemd[1]: Starting motdgen.service... Dec 13 01:53:56.028376 systemd[1]: Started nvidia.service. Dec 13 01:53:56.032381 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:53:56.036494 systemd[1]: Starting sshd-keygen.service... Dec 13 01:53:56.041341 systemd[1]: Starting systemd-logind.service... Dec 13 01:53:56.043368 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:53:56.043473 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:53:56.045119 systemd[1]: Starting update-engine.service... Dec 13 01:53:56.053986 jq[1505]: false Dec 13 01:53:56.049377 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:53:56.054340 jq[1522]: true Dec 13 01:53:56.063527 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:53:56.063847 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:53:56.065234 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:53:56.065550 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:53:56.099274 jq[1528]: true Dec 13 01:53:56.144421 extend-filesystems[1506]: Found loop1 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda1 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda2 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda3 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found usr Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda4 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda6 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda7 Dec 13 01:53:56.144421 extend-filesystems[1506]: Found sda9 Dec 13 01:53:56.144421 extend-filesystems[1506]: Checking size of /dev/sda9 Dec 13 01:53:56.160731 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:53:56.161045 systemd[1]: Finished motdgen.service. Dec 13 01:53:56.222757 systemd-logind[1517]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:53:56.225868 systemd-logind[1517]: New seat seat0. Dec 13 01:53:56.237561 env[1551]: time="2024-12-13T01:53:56.237509386Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:53:56.259217 bash[1546]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:53:56.260487 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:53:56.268789 extend-filesystems[1506]: Old size kept for /dev/sda9 Dec 13 01:53:56.268789 extend-filesystems[1506]: Found sr0 Dec 13 01:53:56.267530 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:53:56.267852 systemd[1]: Finished extend-filesystems.service. Dec 13 01:53:56.361213 env[1551]: time="2024-12-13T01:53:56.361159473Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:53:56.361360 env[1551]: time="2024-12-13T01:53:56.361339867Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363158105Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363200004Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363554092Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363579091Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363597090Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363611790Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.363710687Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.364015576Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.364261868Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:53:56.364526 env[1551]: time="2024-12-13T01:53:56.364286367Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:53:56.364987 env[1551]: time="2024-12-13T01:53:56.364351265Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:53:56.364987 env[1551]: time="2024-12-13T01:53:56.364367064Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380163626Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380245823Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380270222Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380345920Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380411318Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380432417Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380467316Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380487915Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380508114Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380538813Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380560513Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.380577912Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.381019597Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:53:56.381386 env[1551]: time="2024-12-13T01:53:56.381160492Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:53:56.382886 env[1551]: time="2024-12-13T01:53:56.382849735Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:53:56.383035 env[1551]: time="2024-12-13T01:53:56.383016629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383122 env[1551]: time="2024-12-13T01:53:56.383108226Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:53:56.383318 env[1551]: time="2024-12-13T01:53:56.383301419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383406 env[1551]: time="2024-12-13T01:53:56.383393316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383493 env[1551]: time="2024-12-13T01:53:56.383478813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383570 env[1551]: time="2024-12-13T01:53:56.383558410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383645 env[1551]: time="2024-12-13T01:53:56.383632908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383722 env[1551]: time="2024-12-13T01:53:56.383709805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383798 env[1551]: time="2024-12-13T01:53:56.383785803Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383874 env[1551]: time="2024-12-13T01:53:56.383862000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.383961 env[1551]: time="2024-12-13T01:53:56.383947397Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:53:56.384234 env[1551]: time="2024-12-13T01:53:56.384214888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.384331 env[1551]: time="2024-12-13T01:53:56.384315885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.384412 env[1551]: time="2024-12-13T01:53:56.384398982Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.384496 env[1551]: time="2024-12-13T01:53:56.384482979Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:53:56.384584 env[1551]: time="2024-12-13T01:53:56.384567276Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:53:56.384660 env[1551]: time="2024-12-13T01:53:56.384645673Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:53:56.384773 env[1551]: time="2024-12-13T01:53:56.384754470Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:53:56.384892 env[1551]: time="2024-12-13T01:53:56.384876866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:53:56.385353 env[1551]: time="2024-12-13T01:53:56.385275952Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.385502044Z" level=info msg="Connect containerd service" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.385561142Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386493110Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386646405Z" level=info msg="Start subscribing containerd event" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386699403Z" level=info msg="Start recovering state" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386764901Z" level=info msg="Start event monitor" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386783901Z" level=info msg="Start snapshots syncer" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386796300Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.386808600Z" level=info msg="Start streaming server" Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.398012218Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.398102715Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:53:56.418065 env[1551]: time="2024-12-13T01:53:56.401417502Z" level=info msg="containerd successfully booted in 0.164751s" Dec 13 01:53:56.398281 systemd[1]: Started containerd.service. Dec 13 01:53:56.402125 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 01:53:56.440768 dbus-daemon[1504]: [system] SELinux support is enabled Dec 13 01:53:56.441006 systemd[1]: Started dbus.service. Dec 13 01:53:56.445795 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:53:56.445826 systemd[1]: Reached target system-config.target. Dec 13 01:53:56.448332 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:53:56.448363 systemd[1]: Reached target user-config.target. Dec 13 01:53:56.452172 systemd[1]: Started systemd-logind.service. Dec 13 01:53:57.140899 update_engine[1518]: I1213 01:53:57.140311 1518 main.cc:92] Flatcar Update Engine starting Dec 13 01:53:57.192362 systemd[1]: Started update-engine.service. Dec 13 01:53:57.192823 update_engine[1518]: I1213 01:53:57.192425 1518 update_check_scheduler.cc:74] Next update check in 5m2s Dec 13 01:53:57.197575 systemd[1]: Started locksmithd.service. Dec 13 01:53:57.296799 systemd[1]: Started kubelet.service. Dec 13 01:53:58.117681 sshd_keygen[1530]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:53:58.150719 systemd[1]: Finished sshd-keygen.service. Dec 13 01:53:58.155389 systemd[1]: Starting issuegen.service... Dec 13 01:53:58.159702 systemd[1]: Started waagent.service. Dec 13 01:53:58.170151 kubelet[1622]: E1213 01:53:58.170099 1622 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:53:58.172380 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:53:58.172666 systemd[1]: Finished issuegen.service. Dec 13 01:53:58.176749 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:53:58.179664 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:53:58.179856 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:53:58.188934 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:53:58.193443 systemd[1]: Started getty@tty1.service. Dec 13 01:53:58.197334 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:53:58.200580 systemd[1]: Reached target getty.target. Dec 13 01:53:58.202677 systemd[1]: Reached target multi-user.target. Dec 13 01:53:58.206610 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:53:58.216151 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:53:58.216375 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:53:58.220758 systemd[1]: Startup finished in 878ms (firmware) + 30.040s (loader) + 15.880s (kernel) + 29.759s (userspace) = 1min 16.559s. Dec 13 01:53:58.636862 locksmithd[1617]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:53:58.652096 login[1650]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:53:58.653509 login[1651]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:53:58.689082 systemd[1]: Created slice user-500.slice. Dec 13 01:53:58.690574 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:53:58.693273 systemd-logind[1517]: New session 2 of user core. Dec 13 01:53:58.700016 systemd-logind[1517]: New session 1 of user core. Dec 13 01:53:58.705083 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:53:58.706926 systemd[1]: Starting user@500.service... Dec 13 01:53:58.728338 (systemd)[1657]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:58.880990 systemd[1657]: Queued start job for default target default.target. Dec 13 01:53:58.881286 systemd[1657]: Reached target paths.target. Dec 13 01:53:58.881307 systemd[1657]: Reached target sockets.target. Dec 13 01:53:58.881323 systemd[1657]: Reached target timers.target. Dec 13 01:53:58.881337 systemd[1657]: Reached target basic.target. Dec 13 01:53:58.881393 systemd[1657]: Reached target default.target. Dec 13 01:53:58.881425 systemd[1657]: Startup finished in 146ms. Dec 13 01:53:58.881487 systemd[1]: Started user@500.service. Dec 13 01:53:58.882629 systemd[1]: Started session-1.scope. Dec 13 01:53:58.883440 systemd[1]: Started session-2.scope. Dec 13 01:54:04.607007 waagent[1642]: 2024-12-13T01:54:04.606868Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 01:54:04.636518 waagent[1642]: 2024-12-13T01:54:04.624788Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 01:54:04.636518 waagent[1642]: 2024-12-13T01:54:04.626436Z INFO Daemon Daemon Python: 3.9.16 Dec 13 01:54:04.636518 waagent[1642]: 2024-12-13T01:54:04.628137Z INFO Daemon Daemon Run daemon Dec 13 01:54:04.636518 waagent[1642]: 2024-12-13T01:54:04.629380Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 01:54:04.640993 waagent[1642]: 2024-12-13T01:54:04.640855Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:54:04.649160 waagent[1642]: 2024-12-13T01:54:04.649044Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:54:04.654206 waagent[1642]: 2024-12-13T01:54:04.654131Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:54:04.657024 waagent[1642]: 2024-12-13T01:54:04.656940Z INFO Daemon Daemon Using waagent for provisioning Dec 13 01:54:04.660260 waagent[1642]: 2024-12-13T01:54:04.660193Z INFO Daemon Daemon Activate resource disk Dec 13 01:54:04.662791 waagent[1642]: 2024-12-13T01:54:04.662724Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 01:54:04.672958 waagent[1642]: 2024-12-13T01:54:04.672885Z INFO Daemon Daemon Found device: None Dec 13 01:54:04.675684 waagent[1642]: 2024-12-13T01:54:04.675618Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 01:54:04.679834 waagent[1642]: 2024-12-13T01:54:04.679770Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 01:54:04.685859 waagent[1642]: 2024-12-13T01:54:04.685794Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:54:04.689342 waagent[1642]: 2024-12-13T01:54:04.689280Z INFO Daemon Daemon Running default provisioning handler Dec 13 01:54:04.700265 waagent[1642]: 2024-12-13T01:54:04.700135Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:54:04.707276 waagent[1642]: 2024-12-13T01:54:04.707144Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:54:04.715373 waagent[1642]: 2024-12-13T01:54:04.707631Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:54:04.715373 waagent[1642]: 2024-12-13T01:54:04.708493Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 01:54:04.802089 waagent[1642]: 2024-12-13T01:54:04.798504Z INFO Daemon Daemon Successfully mounted dvd Dec 13 01:54:04.856228 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 01:54:04.883178 waagent[1642]: 2024-12-13T01:54:04.883004Z INFO Daemon Daemon Detect protocol endpoint Dec 13 01:54:04.886662 waagent[1642]: 2024-12-13T01:54:04.886568Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:54:04.890236 waagent[1642]: 2024-12-13T01:54:04.890152Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 01:54:04.893989 waagent[1642]: 2024-12-13T01:54:04.893900Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 01:54:04.896927 waagent[1642]: 2024-12-13T01:54:04.896860Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 01:54:04.899729 waagent[1642]: 2024-12-13T01:54:04.899664Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 01:54:04.994370 waagent[1642]: 2024-12-13T01:54:04.994290Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 01:54:05.002350 waagent[1642]: 2024-12-13T01:54:04.995301Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 01:54:05.002350 waagent[1642]: 2024-12-13T01:54:04.996318Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 01:54:05.398863 waagent[1642]: 2024-12-13T01:54:05.398706Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 01:54:05.409407 waagent[1642]: 2024-12-13T01:54:05.409325Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 01:54:05.414508 waagent[1642]: 2024-12-13T01:54:05.409690Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 01:54:05.494109 waagent[1642]: 2024-12-13T01:54:05.493960Z INFO Daemon Daemon Found private key matching thumbprint D9DE0696E98894013A2C9CC07BC7F5DDCC296819 Dec 13 01:54:05.505778 waagent[1642]: 2024-12-13T01:54:05.494483Z INFO Daemon Daemon Certificate with thumbprint C5A18E6764470C4BDB469E0ABA4F374A39D2930D has no matching private key. Dec 13 01:54:05.505778 waagent[1642]: 2024-12-13T01:54:05.495620Z INFO Daemon Daemon Fetch goal state completed Dec 13 01:54:05.547405 waagent[1642]: 2024-12-13T01:54:05.547322Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: fda91797-69d9-4fe2-96ba-f1093eca303d New eTag: 10228085547998292141] Dec 13 01:54:05.555291 waagent[1642]: 2024-12-13T01:54:05.548322Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:54:05.559992 waagent[1642]: 2024-12-13T01:54:05.559910Z INFO Daemon Daemon Starting provisioning Dec 13 01:54:05.567083 waagent[1642]: 2024-12-13T01:54:05.560295Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 01:54:05.567083 waagent[1642]: 2024-12-13T01:54:05.560906Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-e23a6f90f8] Dec 13 01:54:05.589512 waagent[1642]: 2024-12-13T01:54:05.589345Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-e23a6f90f8] Dec 13 01:54:05.593574 waagent[1642]: 2024-12-13T01:54:05.593457Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 01:54:05.597290 waagent[1642]: 2024-12-13T01:54:05.597202Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 01:54:05.612146 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 01:54:05.612473 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 01:54:05.612542 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 01:54:05.612853 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:54:05.616023 systemd-networkd[1242]: eth0: DHCPv6 lease lost Dec 13 01:54:05.617340 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:54:05.617552 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:54:05.620733 systemd[1]: Starting systemd-networkd.service... Dec 13 01:54:05.658876 systemd-networkd[1703]: enP31088s1: Link UP Dec 13 01:54:05.658887 systemd-networkd[1703]: enP31088s1: Gained carrier Dec 13 01:54:05.660237 systemd-networkd[1703]: eth0: Link UP Dec 13 01:54:05.660246 systemd-networkd[1703]: eth0: Gained carrier Dec 13 01:54:05.660672 systemd-networkd[1703]: lo: Link UP Dec 13 01:54:05.660681 systemd-networkd[1703]: lo: Gained carrier Dec 13 01:54:05.661009 systemd-networkd[1703]: eth0: Gained IPv6LL Dec 13 01:54:05.661286 systemd-networkd[1703]: Enumeration completed Dec 13 01:54:05.661456 systemd[1]: Started systemd-networkd.service. Dec 13 01:54:05.663863 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:54:05.665281 systemd-networkd[1703]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:54:05.672430 waagent[1642]: 2024-12-13T01:54:05.672257Z INFO Daemon Daemon Create user account if not exists Dec 13 01:54:05.684039 waagent[1642]: 2024-12-13T01:54:05.672987Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 01:54:05.684039 waagent[1642]: 2024-12-13T01:54:05.673996Z INFO Daemon Daemon Configure sudoer Dec 13 01:54:05.684039 waagent[1642]: 2024-12-13T01:54:05.675385Z INFO Daemon Daemon Configure sshd Dec 13 01:54:05.684039 waagent[1642]: 2024-12-13T01:54:05.676419Z INFO Daemon Daemon Deploy ssh public key. Dec 13 01:54:05.703061 systemd-networkd[1703]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:54:05.706354 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:54:06.834631 waagent[1642]: 2024-12-13T01:54:06.834527Z INFO Daemon Daemon Provisioning complete Dec 13 01:54:06.851075 waagent[1642]: 2024-12-13T01:54:06.850994Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 01:54:06.854521 waagent[1642]: 2024-12-13T01:54:06.854441Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 01:54:06.859909 waagent[1642]: 2024-12-13T01:54:06.859832Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 01:54:07.128612 waagent[1713]: 2024-12-13T01:54:07.128443Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 01:54:07.129377 waagent[1713]: 2024-12-13T01:54:07.129308Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:54:07.129523 waagent[1713]: 2024-12-13T01:54:07.129469Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:54:07.141026 waagent[1713]: 2024-12-13T01:54:07.140936Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 01:54:07.141207 waagent[1713]: 2024-12-13T01:54:07.141154Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 01:54:07.204060 waagent[1713]: 2024-12-13T01:54:07.203909Z INFO ExtHandler ExtHandler Found private key matching thumbprint D9DE0696E98894013A2C9CC07BC7F5DDCC296819 Dec 13 01:54:07.204288 waagent[1713]: 2024-12-13T01:54:07.204225Z INFO ExtHandler ExtHandler Certificate with thumbprint C5A18E6764470C4BDB469E0ABA4F374A39D2930D has no matching private key. Dec 13 01:54:07.204523 waagent[1713]: 2024-12-13T01:54:07.204471Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 01:54:07.218332 waagent[1713]: 2024-12-13T01:54:07.218269Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 4c9a567f-b68b-47eb-ada0-933520938da0 New eTag: 10228085547998292141] Dec 13 01:54:07.218844 waagent[1713]: 2024-12-13T01:54:07.218783Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:54:07.355492 waagent[1713]: 2024-12-13T01:54:07.355318Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:54:07.378721 waagent[1713]: 2024-12-13T01:54:07.378559Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1713 Dec 13 01:54:07.382160 waagent[1713]: 2024-12-13T01:54:07.382090Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:54:07.383416 waagent[1713]: 2024-12-13T01:54:07.383357Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:54:07.462414 waagent[1713]: 2024-12-13T01:54:07.462339Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:54:07.462908 waagent[1713]: 2024-12-13T01:54:07.462829Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:54:07.471443 waagent[1713]: 2024-12-13T01:54:07.471386Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:54:07.471918 waagent[1713]: 2024-12-13T01:54:07.471857Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:54:07.472997 waagent[1713]: 2024-12-13T01:54:07.472920Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 01:54:07.474275 waagent[1713]: 2024-12-13T01:54:07.474215Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:54:07.475038 waagent[1713]: 2024-12-13T01:54:07.474977Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:54:07.475215 waagent[1713]: 2024-12-13T01:54:07.475163Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:54:07.475733 waagent[1713]: 2024-12-13T01:54:07.475673Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:54:07.476002 waagent[1713]: 2024-12-13T01:54:07.475924Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:54:07.476365 waagent[1713]: 2024-12-13T01:54:07.476314Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:54:07.476512 waagent[1713]: 2024-12-13T01:54:07.476460Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:54:07.477159 waagent[1713]: 2024-12-13T01:54:07.477099Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:54:07.477350 waagent[1713]: 2024-12-13T01:54:07.477296Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:54:07.477824 waagent[1713]: 2024-12-13T01:54:07.477768Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:54:07.478121 waagent[1713]: 2024-12-13T01:54:07.478071Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:54:07.478494 waagent[1713]: 2024-12-13T01:54:07.478442Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:54:07.478771 waagent[1713]: 2024-12-13T01:54:07.478720Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:54:07.478771 waagent[1713]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:54:07.478771 waagent[1713]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:54:07.478771 waagent[1713]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:54:07.478771 waagent[1713]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:54:07.478771 waagent[1713]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:54:07.478771 waagent[1713]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:54:07.479234 waagent[1713]: 2024-12-13T01:54:07.479178Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:54:07.479469 waagent[1713]: 2024-12-13T01:54:07.479418Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:54:07.486597 waagent[1713]: 2024-12-13T01:54:07.486527Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:54:07.496551 waagent[1713]: 2024-12-13T01:54:07.496497Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 01:54:07.497506 waagent[1713]: 2024-12-13T01:54:07.497460Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:54:07.498579 waagent[1713]: 2024-12-13T01:54:07.498528Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 01:54:07.538793 waagent[1713]: 2024-12-13T01:54:07.538712Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 01:54:07.549575 waagent[1713]: 2024-12-13T01:54:07.549504Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1703' Dec 13 01:54:07.662880 waagent[1713]: 2024-12-13T01:54:07.662708Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:54:07.662880 waagent[1713]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:54:07.662880 waagent[1713]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:54:07.662880 waagent[1713]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:be:a5 brd ff:ff:ff:ff:ff:ff Dec 13 01:54:07.662880 waagent[1713]: 3: enP31088s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:be:a5 brd ff:ff:ff:ff:ff:ff\ altname enP31088p0s2 Dec 13 01:54:07.662880 waagent[1713]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:54:07.662880 waagent[1713]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:54:07.662880 waagent[1713]: 2: eth0 inet 10.200.8.13/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:54:07.662880 waagent[1713]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:54:07.662880 waagent[1713]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:54:07.662880 waagent[1713]: 2: eth0 inet6 fe80::6245:bdff:fedf:bea5/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:54:07.845962 waagent[1713]: 2024-12-13T01:54:07.845898Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 01:54:08.214012 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:54:08.214329 systemd[1]: Stopped kubelet.service. Dec 13 01:54:08.216514 systemd[1]: Starting kubelet.service... Dec 13 01:54:08.303559 systemd[1]: Started kubelet.service. Dec 13 01:54:08.864577 waagent[1642]: 2024-12-13T01:54:08.864399Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 01:54:08.871811 waagent[1642]: 2024-12-13T01:54:08.871700Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 01:54:08.928867 kubelet[1751]: E1213 01:54:08.928817 1751 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:08.933772 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:08.934004 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:09.943269 waagent[1756]: 2024-12-13T01:54:09.943156Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 01:54:09.944001 waagent[1756]: 2024-12-13T01:54:09.943924Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 01:54:09.944157 waagent[1756]: 2024-12-13T01:54:09.944105Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 01:54:09.944305 waagent[1756]: 2024-12-13T01:54:09.944258Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 01:54:09.953829 waagent[1756]: 2024-12-13T01:54:09.953732Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:54:09.954240 waagent[1756]: 2024-12-13T01:54:09.954183Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:54:09.954401 waagent[1756]: 2024-12-13T01:54:09.954353Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:54:09.966179 waagent[1756]: 2024-12-13T01:54:09.966108Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 01:54:09.974827 waagent[1756]: 2024-12-13T01:54:09.974760Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 01:54:09.975837 waagent[1756]: 2024-12-13T01:54:09.975774Z INFO ExtHandler Dec 13 01:54:09.976001 waagent[1756]: 2024-12-13T01:54:09.975937Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 006a1fcb-5477-4ef3-8ad6-c4bc6df43510 eTag: 10228085547998292141 source: Fabric] Dec 13 01:54:09.976701 waagent[1756]: 2024-12-13T01:54:09.976643Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 01:54:09.977793 waagent[1756]: 2024-12-13T01:54:09.977731Z INFO ExtHandler Dec 13 01:54:09.977945 waagent[1756]: 2024-12-13T01:54:09.977892Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 01:54:09.984896 waagent[1756]: 2024-12-13T01:54:09.984845Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 01:54:09.985344 waagent[1756]: 2024-12-13T01:54:09.985296Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:54:10.005998 waagent[1756]: 2024-12-13T01:54:10.005901Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 01:54:10.073445 waagent[1756]: 2024-12-13T01:54:10.073304Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D9DE0696E98894013A2C9CC07BC7F5DDCC296819', 'hasPrivateKey': True} Dec 13 01:54:10.074495 waagent[1756]: 2024-12-13T01:54:10.074424Z INFO ExtHandler Downloaded certificate {'thumbprint': 'C5A18E6764470C4BDB469E0ABA4F374A39D2930D', 'hasPrivateKey': False} Dec 13 01:54:10.075477 waagent[1756]: 2024-12-13T01:54:10.075410Z INFO ExtHandler Fetch goal state completed Dec 13 01:54:10.094833 waagent[1756]: 2024-12-13T01:54:10.094735Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 01:54:10.106318 waagent[1756]: 2024-12-13T01:54:10.106219Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1756 Dec 13 01:54:10.109377 waagent[1756]: 2024-12-13T01:54:10.109311Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:54:10.110341 waagent[1756]: 2024-12-13T01:54:10.110282Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 01:54:10.110620 waagent[1756]: 2024-12-13T01:54:10.110567Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 01:54:10.112575 waagent[1756]: 2024-12-13T01:54:10.112519Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:54:10.117381 waagent[1756]: 2024-12-13T01:54:10.117327Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:54:10.117751 waagent[1756]: 2024-12-13T01:54:10.117695Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:54:10.125864 waagent[1756]: 2024-12-13T01:54:10.125810Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:54:10.126328 waagent[1756]: 2024-12-13T01:54:10.126273Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:54:10.132138 waagent[1756]: 2024-12-13T01:54:10.132044Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 01:54:10.133145 waagent[1756]: 2024-12-13T01:54:10.133082Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 01:54:10.134540 waagent[1756]: 2024-12-13T01:54:10.134480Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:54:10.134954 waagent[1756]: 2024-12-13T01:54:10.134898Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:54:10.135312 waagent[1756]: 2024-12-13T01:54:10.135255Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:54:10.135838 waagent[1756]: 2024-12-13T01:54:10.135781Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:54:10.136598 waagent[1756]: 2024-12-13T01:54:10.136540Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:54:10.136681 waagent[1756]: 2024-12-13T01:54:10.136622Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:54:10.136681 waagent[1756]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:54:10.136681 waagent[1756]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:54:10.136681 waagent[1756]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:54:10.136681 waagent[1756]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:54:10.136681 waagent[1756]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:54:10.136681 waagent[1756]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:54:10.136986 waagent[1756]: 2024-12-13T01:54:10.136922Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:54:10.137862 waagent[1756]: 2024-12-13T01:54:10.137804Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:54:10.138007 waagent[1756]: 2024-12-13T01:54:10.137908Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:54:10.140653 waagent[1756]: 2024-12-13T01:54:10.140541Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:54:10.141037 waagent[1756]: 2024-12-13T01:54:10.140939Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:54:10.141718 waagent[1756]: 2024-12-13T01:54:10.141656Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:54:10.142378 waagent[1756]: 2024-12-13T01:54:10.142322Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:54:10.144467 waagent[1756]: 2024-12-13T01:54:10.144344Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:54:10.145297 waagent[1756]: 2024-12-13T01:54:10.145215Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:54:10.150119 waagent[1756]: 2024-12-13T01:54:10.150011Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:54:10.161356 waagent[1756]: 2024-12-13T01:54:10.161296Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 01:54:10.164262 waagent[1756]: 2024-12-13T01:54:10.164199Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:54:10.164262 waagent[1756]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:54:10.164262 waagent[1756]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:54:10.164262 waagent[1756]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:be:a5 brd ff:ff:ff:ff:ff:ff Dec 13 01:54:10.164262 waagent[1756]: 3: enP31088s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:df:be:a5 brd ff:ff:ff:ff:ff:ff\ altname enP31088p0s2 Dec 13 01:54:10.164262 waagent[1756]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:54:10.164262 waagent[1756]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:54:10.164262 waagent[1756]: 2: eth0 inet 10.200.8.13/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:54:10.164262 waagent[1756]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:54:10.164262 waagent[1756]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:54:10.164262 waagent[1756]: 2: eth0 inet6 fe80::6245:bdff:fedf:bea5/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:54:10.195617 waagent[1756]: 2024-12-13T01:54:10.195219Z INFO ExtHandler ExtHandler Dec 13 01:54:10.199059 waagent[1756]: 2024-12-13T01:54:10.198991Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: aeea1256-98c3-46fb-8bdf-fa1164933704 correlation 9b086dfd-1d7e-493b-ae2e-d86c4f486c4c created: 2024-12-13T01:52:31.110710Z] Dec 13 01:54:10.201862 waagent[1756]: 2024-12-13T01:54:10.201781Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 01:54:10.204066 waagent[1756]: 2024-12-13T01:54:10.204006Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 8 ms] Dec 13 01:54:10.238745 waagent[1756]: 2024-12-13T01:54:10.238672Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 01:54:10.250384 waagent[1756]: 2024-12-13T01:54:10.250313Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: FAEC66E5-0FA3-42BD-9B3D-B1E4350F8F90;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 01:54:10.368292 waagent[1756]: 2024-12-13T01:54:10.368168Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 01:54:10.368292 waagent[1756]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:54:10.368292 waagent[1756]: pkts bytes target prot opt in out source destination Dec 13 01:54:10.368292 waagent[1756]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:54:10.368292 waagent[1756]: pkts bytes target prot opt in out source destination Dec 13 01:54:10.368292 waagent[1756]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:54:10.368292 waagent[1756]: pkts bytes target prot opt in out source destination Dec 13 01:54:10.368292 waagent[1756]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:54:10.368292 waagent[1756]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:54:10.368292 waagent[1756]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:54:10.375598 waagent[1756]: 2024-12-13T01:54:10.375495Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 01:54:10.375598 waagent[1756]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:54:10.375598 waagent[1756]: pkts bytes target prot opt in out source destination Dec 13 01:54:10.375598 waagent[1756]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:54:10.375598 waagent[1756]: pkts bytes target prot opt in out source destination Dec 13 01:54:10.375598 waagent[1756]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:54:10.375598 waagent[1756]: pkts bytes target prot opt in out source destination Dec 13 01:54:10.375598 waagent[1756]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:54:10.375598 waagent[1756]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:54:10.375598 waagent[1756]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:54:10.376196 waagent[1756]: 2024-12-13T01:54:10.376141Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 01:54:18.963909 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:54:18.964276 systemd[1]: Stopped kubelet.service. Dec 13 01:54:18.966448 systemd[1]: Starting kubelet.service... Dec 13 01:54:19.296667 systemd[1]: Started kubelet.service. Dec 13 01:54:19.602935 kubelet[1819]: E1213 01:54:19.602813 1819 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:19.604842 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:19.605064 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:29.713942 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 01:54:29.714321 systemd[1]: Stopped kubelet.service. Dec 13 01:54:29.716445 systemd[1]: Starting kubelet.service... Dec 13 01:54:30.051609 systemd[1]: Started kubelet.service. Dec 13 01:54:30.340047 kubelet[1835]: E1213 01:54:30.339917 1835 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:30.341741 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:30.341928 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:33.820428 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 01:54:37.981458 systemd[1]: Created slice system-sshd.slice. Dec 13 01:54:37.983441 systemd[1]: Started sshd@0-10.200.8.13:22-10.200.16.10:42348.service. Dec 13 01:54:38.853990 sshd[1842]: Accepted publickey for core from 10.200.16.10 port 42348 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:38.855825 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:38.861197 systemd-logind[1517]: New session 3 of user core. Dec 13 01:54:38.861904 systemd[1]: Started session-3.scope. Dec 13 01:54:39.394850 systemd[1]: Started sshd@1-10.200.8.13:22-10.200.16.10:56388.service. Dec 13 01:54:40.015444 sshd[1847]: Accepted publickey for core from 10.200.16.10 port 56388 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:40.017212 sshd[1847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:40.023160 systemd[1]: Started session-4.scope. Dec 13 01:54:40.024042 systemd-logind[1517]: New session 4 of user core. Dec 13 01:54:40.359762 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 01:54:40.360033 systemd[1]: Stopped kubelet.service. Dec 13 01:54:40.362078 systemd[1]: Starting kubelet.service... Dec 13 01:54:40.460689 sshd[1847]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:40.464327 systemd[1]: sshd@1-10.200.8.13:22-10.200.16.10:56388.service: Deactivated successfully. Dec 13 01:54:40.465810 systemd-logind[1517]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:54:40.465907 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:54:40.467166 systemd-logind[1517]: Removed session 4. Dec 13 01:54:40.563917 systemd[1]: Started sshd@2-10.200.8.13:22-10.200.16.10:56392.service. Dec 13 01:54:40.699946 systemd[1]: Started kubelet.service. Dec 13 01:54:41.011934 kubelet[1863]: E1213 01:54:41.011875 1863 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:54:41.013691 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:54:41.013885 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:54:41.185867 sshd[1857]: Accepted publickey for core from 10.200.16.10 port 56392 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:41.187532 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:41.193395 systemd[1]: Started session-5.scope. Dec 13 01:54:41.194031 systemd-logind[1517]: New session 5 of user core. Dec 13 01:54:41.627342 sshd[1857]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:41.630993 systemd[1]: sshd@2-10.200.8.13:22-10.200.16.10:56392.service: Deactivated successfully. Dec 13 01:54:41.633235 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:54:41.633754 systemd-logind[1517]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:54:41.635203 systemd-logind[1517]: Removed session 5. Dec 13 01:54:41.730536 systemd[1]: Started sshd@3-10.200.8.13:22-10.200.16.10:56406.service. Dec 13 01:54:42.353924 sshd[1876]: Accepted publickey for core from 10.200.16.10 port 56406 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:42.355626 sshd[1876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:42.360613 systemd[1]: Started session-6.scope. Dec 13 01:54:42.360896 systemd-logind[1517]: New session 6 of user core. Dec 13 01:54:42.580889 update_engine[1518]: I1213 01:54:42.580801 1518 update_attempter.cc:509] Updating boot flags... Dec 13 01:54:42.803850 sshd[1876]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:42.807155 systemd[1]: sshd@3-10.200.8.13:22-10.200.16.10:56406.service: Deactivated successfully. Dec 13 01:54:42.808302 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:54:42.810071 systemd-logind[1517]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:54:42.811221 systemd-logind[1517]: Removed session 6. Dec 13 01:54:42.907027 systemd[1]: Started sshd@4-10.200.8.13:22-10.200.16.10:56416.service. Dec 13 01:54:43.528143 sshd[1922]: Accepted publickey for core from 10.200.16.10 port 56416 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:43.529815 sshd[1922]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:43.535062 systemd[1]: Started session-7.scope. Dec 13 01:54:43.535308 systemd-logind[1517]: New session 7 of user core. Dec 13 01:54:44.079385 sudo[1926]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:54:44.079778 sudo[1926]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:44.123228 dbus-daemon[1504]: \xd0=\x84\\xa8U: received setenforce notice (enforcing=-1879245664) Dec 13 01:54:44.125308 sudo[1926]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:44.246493 sshd[1922]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:44.250464 systemd[1]: sshd@4-10.200.8.13:22-10.200.16.10:56416.service: Deactivated successfully. Dec 13 01:54:44.252546 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:54:44.253294 systemd-logind[1517]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:54:44.254893 systemd-logind[1517]: Removed session 7. Dec 13 01:54:44.349219 systemd[1]: Started sshd@5-10.200.8.13:22-10.200.16.10:56426.service. Dec 13 01:54:44.972068 sshd[1930]: Accepted publickey for core from 10.200.16.10 port 56426 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:44.973810 sshd[1930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:44.979693 systemd[1]: Started session-8.scope. Dec 13 01:54:44.980027 systemd-logind[1517]: New session 8 of user core. Dec 13 01:54:45.319938 sudo[1935]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:54:45.320243 sudo[1935]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:45.323204 sudo[1935]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:45.327905 sudo[1934]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:54:45.328205 sudo[1934]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:45.337326 systemd[1]: Stopping audit-rules.service... Dec 13 01:54:45.337000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:54:45.341123 auditctl[1938]: No rules Dec 13 01:54:45.341564 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:54:45.341795 systemd[1]: Stopped audit-rules.service. Dec 13 01:54:45.343515 systemd[1]: Starting audit-rules.service... Dec 13 01:54:45.347992 kernel: audit: type=1305 audit(1734054885.337:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:54:45.348054 kernel: audit: type=1300 audit(1734054885.337:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff094a17a0 a2=420 a3=0 items=0 ppid=1 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.337000 audit[1938]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff094a17a0 a2=420 a3=0 items=0 ppid=1 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:45.366009 kernel: audit: type=1327 audit(1734054885.337:160): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:54:45.337000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:54:45.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.371062 augenrules[1956]: No rules Dec 13 01:54:45.371902 systemd[1]: Finished audit-rules.service. Dec 13 01:54:45.376863 sudo[1934]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:45.377058 kernel: audit: type=1131 audit(1734054885.340:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.375000 audit[1934]: USER_END pid=1934 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.387999 kernel: audit: type=1130 audit(1734054885.371:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.388035 kernel: audit: type=1106 audit(1734054885.375:163): pid=1934 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.400308 kernel: audit: type=1104 audit(1734054885.376:164): pid=1934 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.376000 audit[1934]: CRED_DISP pid=1934 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.477787 sshd[1930]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:45.478000 audit[1930]: USER_END pid=1930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:45.486304 systemd[1]: sshd@5-10.200.8.13:22-10.200.16.10:56426.service: Deactivated successfully. Dec 13 01:54:45.487056 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 01:54:45.488439 systemd-logind[1517]: Session 8 logged out. Waiting for processes to exit. Dec 13 01:54:45.489368 systemd-logind[1517]: Removed session 8. Dec 13 01:54:45.478000 audit[1930]: CRED_DISP pid=1930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:45.505857 kernel: audit: type=1106 audit(1734054885.478:165): pid=1930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:45.505916 kernel: audit: type=1104 audit(1734054885.478:166): pid=1930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:45.505943 kernel: audit: type=1131 audit(1734054885.484:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.13:22-10.200.16.10:56426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.13:22-10.200.16.10:56426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:45.582076 systemd[1]: Started sshd@6-10.200.8.13:22-10.200.16.10:56440.service. Dec 13 01:54:45.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.16.10:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:46.202000 audit[1963]: USER_ACCT pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:46.203383 sshd[1963]: Accepted publickey for core from 10.200.16.10 port 56440 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:54:46.203000 audit[1963]: CRED_ACQ pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:46.203000 audit[1963]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6a86ac40 a2=3 a3=0 items=0 ppid=1 pid=1963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:46.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:54:46.205141 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:54:46.210818 systemd[1]: Started session-9.scope. Dec 13 01:54:46.211240 systemd-logind[1517]: New session 9 of user core. Dec 13 01:54:46.215000 audit[1963]: USER_START pid=1963 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:46.217000 audit[1966]: CRED_ACQ pid=1966 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:46.546000 audit[1967]: USER_ACCT pid=1967 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:46.546000 audit[1967]: CRED_REFR pid=1967 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:46.547803 sudo[1967]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:54:46.548145 sudo[1967]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:54:46.548000 audit[1967]: USER_START pid=1967 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:46.561084 systemd[1]: Starting coreos-metadata.service... Dec 13 01:54:46.634660 coreos-metadata[1971]: Dec 13 01:54:46.634 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 01:54:46.636836 coreos-metadata[1971]: Dec 13 01:54:46.636 INFO Fetch successful Dec 13 01:54:46.637139 coreos-metadata[1971]: Dec 13 01:54:46.637 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Dec 13 01:54:46.638533 coreos-metadata[1971]: Dec 13 01:54:46.638 INFO Fetch successful Dec 13 01:54:46.638877 coreos-metadata[1971]: Dec 13 01:54:46.638 INFO Fetching http://168.63.129.16/machine/8c5bd88e-2d95-473e-bc1a-3bfb35407058/52924735%2D644b%2D43d1%2Da679%2D6d4e24883fb8.%5Fci%2D3510.3.6%2Da%2De23a6f90f8?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Dec 13 01:54:46.640457 coreos-metadata[1971]: Dec 13 01:54:46.640 INFO Fetch successful Dec 13 01:54:46.673331 coreos-metadata[1971]: Dec 13 01:54:46.673 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Dec 13 01:54:46.684165 coreos-metadata[1971]: Dec 13 01:54:46.684 INFO Fetch successful Dec 13 01:54:46.697309 systemd[1]: Finished coreos-metadata.service. Dec 13 01:54:46.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.598563 systemd[1]: Stopped kubelet.service. Dec 13 01:54:50.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.609135 kernel: kauditd_printk_skb: 12 callbacks suppressed Dec 13 01:54:50.609235 kernel: audit: type=1130 audit(1734054890.597:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.603604 systemd[1]: Starting kubelet.service... Dec 13 01:54:50.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.631989 kernel: audit: type=1131 audit(1734054890.600:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.650631 systemd[1]: Reloading. Dec 13 01:54:50.743660 /usr/lib/systemd/system-generators/torcx-generator[2036]: time="2024-12-13T01:54:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:54:50.743702 /usr/lib/systemd/system-generators/torcx-generator[2036]: time="2024-12-13T01:54:50Z" level=info msg="torcx already run" Dec 13 01:54:50.873479 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:54:50.873504 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:54:50.892224 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:54:50.981611 systemd[1]: Started kubelet.service. Dec 13 01:54:50.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.988117 systemd[1]: Stopping kubelet.service... Dec 13 01:54:50.988719 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:54:50.988977 systemd[1]: Stopped kubelet.service. Dec 13 01:54:50.990631 systemd[1]: Starting kubelet.service... Dec 13 01:54:50.994986 kernel: audit: type=1130 audit(1734054890.981:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:50.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:51.017052 kernel: audit: type=1131 audit(1734054890.988:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:51.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:51.247906 systemd[1]: Started kubelet.service. Dec 13 01:54:51.261983 kernel: audit: type=1130 audit(1734054891.247:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:51.900532 kubelet[2117]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:54:51.900923 kubelet[2117]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:54:51.900923 kubelet[2117]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:54:51.901071 kubelet[2117]: I1213 01:54:51.901011 2117 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:54:52.285571 kubelet[2117]: I1213 01:54:52.285531 2117 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 01:54:52.285571 kubelet[2117]: I1213 01:54:52.285561 2117 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:54:52.285823 kubelet[2117]: I1213 01:54:52.285803 2117 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 01:54:52.310415 kubelet[2117]: I1213 01:54:52.310379 2117 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:54:52.328244 kubelet[2117]: I1213 01:54:52.328215 2117 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:54:52.328803 kubelet[2117]: I1213 01:54:52.328779 2117 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:54:52.329003 kubelet[2117]: I1213 01:54:52.328982 2117 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:54:52.329153 kubelet[2117]: I1213 01:54:52.329019 2117 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:54:52.329153 kubelet[2117]: I1213 01:54:52.329034 2117 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:54:52.329244 kubelet[2117]: I1213 01:54:52.329193 2117 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:54:52.329329 kubelet[2117]: I1213 01:54:52.329310 2117 kubelet.go:396] "Attempting to sync node with API server" Dec 13 01:54:52.329387 kubelet[2117]: I1213 01:54:52.329335 2117 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:54:52.329387 kubelet[2117]: I1213 01:54:52.329364 2117 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:54:52.329387 kubelet[2117]: I1213 01:54:52.329384 2117 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:54:52.336223 kubelet[2117]: E1213 01:54:52.336124 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:52.336223 kubelet[2117]: E1213 01:54:52.336157 2117 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:52.336367 kubelet[2117]: I1213 01:54:52.336272 2117 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:54:52.339699 kubelet[2117]: I1213 01:54:52.339674 2117 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:54:52.339801 kubelet[2117]: W1213 01:54:52.339746 2117 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:54:52.340348 kubelet[2117]: I1213 01:54:52.340325 2117 server.go:1256] "Started kubelet" Dec 13 01:54:52.341525 kubelet[2117]: I1213 01:54:52.341495 2117 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:54:52.342553 kubelet[2117]: I1213 01:54:52.342532 2117 server.go:461] "Adding debug handlers to kubelet server" Dec 13 01:54:52.342856 kubelet[2117]: I1213 01:54:52.342836 2117 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:54:52.343412 kubelet[2117]: I1213 01:54:52.343376 2117 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:54:52.343000 audit[2117]: AVC avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:52.356147 kubelet[2117]: W1213 01:54:52.351962 2117 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 01:54:52.356147 kubelet[2117]: E1213 01:54:52.352011 2117 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 01:54:52.356147 kubelet[2117]: W1213 01:54:52.352078 2117 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.200.8.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 01:54:52.356147 kubelet[2117]: E1213 01:54:52.352099 2117 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 01:54:52.356147 kubelet[2117]: E1213 01:54:52.353574 2117 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.8.13.181099bcb6f8ccbd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.8.13,UID:10.200.8.13,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.8.13,},FirstTimestamp:2024-12-13 01:54:52.340300989 +0000 UTC m=+1.084904560,LastTimestamp:2024-12-13 01:54:52.340300989 +0000 UTC m=+1.084904560,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.8.13,}" Dec 13 01:54:52.356417 kubelet[2117]: E1213 01:54:52.355466 2117 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:54:52.356538 kubelet[2117]: I1213 01:54:52.356522 2117 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:54:52.356663 kubelet[2117]: I1213 01:54:52.356652 2117 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:54:52.356835 kubelet[2117]: I1213 01:54:52.356824 2117 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:54:52.359006 kernel: audit: type=1400 audit(1734054892.343:183): avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:52.360719 kubelet[2117]: I1213 01:54:52.360579 2117 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:54:52.360860 kubelet[2117]: I1213 01:54:52.360839 2117 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 01:54:52.360928 kubelet[2117]: I1213 01:54:52.360901 2117 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 01:54:52.362797 kubelet[2117]: I1213 01:54:52.362772 2117 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:54:52.343000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:52.363174 kubelet[2117]: I1213 01:54:52.362877 2117 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:54:52.343000 audit[2117]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ceff20 a1=c0005bef30 a2=c000cefef0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.370637 kubelet[2117]: I1213 01:54:52.370624 2117 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:54:52.390781 kernel: audit: type=1401 audit(1734054892.343:183): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:52.390896 kernel: audit: type=1300 audit(1734054892.343:183): arch=c000003e syscall=188 success=no exit=-22 a0=c000ceff20 a1=c0005bef30 a2=c000cefef0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.343000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:52.403220 kubelet[2117]: I1213 01:54:52.403195 2117 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:54:52.403350 kubelet[2117]: I1213 01:54:52.403342 2117 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:54:52.403407 kubelet[2117]: I1213 01:54:52.403396 2117 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:54:52.409992 kernel: audit: type=1327 audit(1734054892.343:183): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:52.410084 kubelet[2117]: E1213 01:54:52.410065 2117 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.13\" not found" node="10.200.8.13" Dec 13 01:54:52.354000 audit[2117]: AVC avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:52.416484 kubelet[2117]: I1213 01:54:52.416467 2117 policy_none.go:49] "None policy: Start" Dec 13 01:54:52.417148 kubelet[2117]: I1213 01:54:52.417134 2117 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:54:52.417317 kubelet[2117]: I1213 01:54:52.417310 2117 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:54:52.354000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:52.354000 audit[2117]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae8840 a1=c0005bef48 a2=c000ceffb0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.425249 kernel: audit: type=1400 audit(1734054892.354:184): avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:52.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:52.395000 audit[2128]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.395000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdaaada7d0 a2=0 a3=7ffdaaada7bc items=0 ppid=2117 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:54:52.400000 audit[2130]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.400000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff66b0ff10 a2=0 a3=7fff66b0fefc items=0 ppid=2117 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:54:52.409000 audit[2134]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.409000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff638c87b0 a2=0 a3=7fff638c879c items=0 ppid=2117 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:54:52.409000 audit[2136]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.409000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa91052f0 a2=0 a3=7fffa91052dc items=0 ppid=2117 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:54:52.430045 kubelet[2117]: I1213 01:54:52.430025 2117 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:54:52.430230 kubelet[2117]: I1213 01:54:52.430205 2117 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:54:52.429000 audit[2117]: AVC avc: denied { mac_admin } for pid=2117 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:54:52.429000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:54:52.429000 audit[2117]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000de5110 a1=c000dd2bb8 a2=c000de50e0 a3=25 items=0 ppid=1 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.429000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:54:52.430608 kubelet[2117]: I1213 01:54:52.430434 2117 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:54:52.436609 kubelet[2117]: E1213 01:54:52.436594 2117 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.13\" not found" Dec 13 01:54:52.438000 audit[2139]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.438000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffd817ffb0 a2=0 a3=7fffd817ff9c items=0 ppid=2117 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:54:52.440381 kubelet[2117]: I1213 01:54:52.439332 2117 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:54:52.440000 audit[2140]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:52.440000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc831eee40 a2=0 a3=7ffc831eee2c items=0 ppid=2117 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:54:52.441769 kubelet[2117]: I1213 01:54:52.441710 2117 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:54:52.441769 kubelet[2117]: I1213 01:54:52.441735 2117 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:54:52.441769 kubelet[2117]: I1213 01:54:52.441753 2117 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 01:54:52.441886 kubelet[2117]: E1213 01:54:52.441870 2117 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 01:54:52.442000 audit[2142]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.442000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebc35d470 a2=0 a3=7ffebc35d45c items=0 ppid=2117 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:54:52.443000 audit[2144]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.443000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3e28ddc0 a2=0 a3=7fff3e28ddac items=0 ppid=2117 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:54:52.444000 audit[2143]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:52.444000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2cfb9ca0 a2=0 a3=7ffd2cfb9c8c items=0 ppid=2117 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:54:52.445000 audit[2145]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:54:52.445000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc451dee0 a2=0 a3=7ffdc451decc items=0 ppid=2117 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:54:52.446000 audit[2146]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:52.446000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd24d7d40 a2=0 a3=7fffd24d7d2c items=0 ppid=2117 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:54:52.447000 audit[2147]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:54:52.447000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdecbcb980 a2=0 a3=7ffdecbcb96c items=0 ppid=2117 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:54:52.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:54:52.462014 kubelet[2117]: I1213 01:54:52.461990 2117 kubelet_node_status.go:73] "Attempting to register node" node="10.200.8.13" Dec 13 01:54:52.480093 kubelet[2117]: I1213 01:54:52.480071 2117 kubelet_node_status.go:76] "Successfully registered node" node="10.200.8.13" Dec 13 01:54:52.490402 kubelet[2117]: E1213 01:54:52.490375 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:52.591414 kubelet[2117]: E1213 01:54:52.591278 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:52.691878 kubelet[2117]: E1213 01:54:52.691822 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:52.792620 kubelet[2117]: E1213 01:54:52.792564 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:52.894030 kubelet[2117]: E1213 01:54:52.893847 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:52.994443 kubelet[2117]: E1213 01:54:52.994391 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:53.095261 kubelet[2117]: E1213 01:54:53.095212 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:53.196133 kubelet[2117]: E1213 01:54:53.196002 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:53.291804 kubelet[2117]: I1213 01:54:53.291743 2117 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 01:54:53.292098 kubelet[2117]: W1213 01:54:53.292052 2117 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:54:53.292201 kubelet[2117]: W1213 01:54:53.292158 2117 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 01:54:53.296944 kubelet[2117]: E1213 01:54:53.296902 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:53.336544 kubelet[2117]: E1213 01:54:53.336490 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:53.397341 kubelet[2117]: E1213 01:54:53.397284 2117 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.13\" not found" Dec 13 01:54:53.499052 kubelet[2117]: I1213 01:54:53.499013 2117 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 01:54:53.499566 env[1551]: time="2024-12-13T01:54:53.499509853Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:54:53.500110 kubelet[2117]: I1213 01:54:53.499786 2117 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 01:54:53.769000 audit[1967]: USER_END pid=1967 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.769000 audit[1967]: CRED_DISP pid=1967 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.770534 sudo[1967]: pam_unix(sudo:session): session closed for user root Dec 13 01:54:53.871186 sshd[1963]: pam_unix(sshd:session): session closed for user core Dec 13 01:54:53.871000 audit[1963]: USER_END pid=1963 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:53.872000 audit[1963]: CRED_DISP pid=1963 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:54:53.874438 systemd[1]: sshd@6-10.200.8.13:22-10.200.16.10:56440.service: Deactivated successfully. Dec 13 01:54:53.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.16.10:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:54:53.875759 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 01:54:53.875786 systemd-logind[1517]: Session 9 logged out. Waiting for processes to exit. Dec 13 01:54:53.878205 systemd-logind[1517]: Removed session 9. Dec 13 01:54:54.335815 kubelet[2117]: I1213 01:54:54.335756 2117 apiserver.go:52] "Watching apiserver" Dec 13 01:54:54.337008 kubelet[2117]: E1213 01:54:54.336845 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:54.340458 kubelet[2117]: I1213 01:54:54.340430 2117 topology_manager.go:215] "Topology Admit Handler" podUID="2ee29b95-e2e1-46d4-b340-80d6712dbbde" podNamespace="calico-system" podName="calico-node-9rkhb" Dec 13 01:54:54.340578 kubelet[2117]: I1213 01:54:54.340557 2117 topology_manager.go:215] "Topology Admit Handler" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" podNamespace="calico-system" podName="csi-node-driver-b8h4x" Dec 13 01:54:54.340636 kubelet[2117]: I1213 01:54:54.340617 2117 topology_manager.go:215] "Topology Admit Handler" podUID="27919e61-b5be-42ea-85f2-a5a5d8497c3f" podNamespace="kube-system" podName="kube-proxy-vlxx6" Dec 13 01:54:54.341027 kubelet[2117]: E1213 01:54:54.341008 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:54:54.361751 kubelet[2117]: I1213 01:54:54.361719 2117 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 01:54:54.372818 kubelet[2117]: I1213 01:54:54.372785 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b8bfbd61-8e15-4058-a6ad-858fe1555dcb-kubelet-dir\") pod \"csi-node-driver-b8h4x\" (UID: \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\") " pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:54:54.372818 kubelet[2117]: I1213 01:54:54.372831 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/27919e61-b5be-42ea-85f2-a5a5d8497c3f-xtables-lock\") pod \"kube-proxy-vlxx6\" (UID: \"27919e61-b5be-42ea-85f2-a5a5d8497c3f\") " pod="kube-system/kube-proxy-vlxx6" Dec 13 01:54:54.373071 kubelet[2117]: I1213 01:54:54.372860 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-policysync\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373071 kubelet[2117]: I1213 01:54:54.372883 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b8bfbd61-8e15-4058-a6ad-858fe1555dcb-varrun\") pod \"csi-node-driver-b8h4x\" (UID: \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\") " pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:54:54.373071 kubelet[2117]: I1213 01:54:54.372906 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2ee29b95-e2e1-46d4-b340-80d6712dbbde-node-certs\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373071 kubelet[2117]: I1213 01:54:54.372930 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-cni-net-dir\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373071 kubelet[2117]: I1213 01:54:54.372954 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-cni-log-dir\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373267 kubelet[2117]: I1213 01:54:54.372995 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-flexvol-driver-host\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373267 kubelet[2117]: I1213 01:54:54.373024 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p28wb\" (UniqueName: \"kubernetes.io/projected/2ee29b95-e2e1-46d4-b340-80d6712dbbde-kube-api-access-p28wb\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373267 kubelet[2117]: I1213 01:54:54.373052 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/27919e61-b5be-42ea-85f2-a5a5d8497c3f-kube-proxy\") pod \"kube-proxy-vlxx6\" (UID: \"27919e61-b5be-42ea-85f2-a5a5d8497c3f\") " pod="kube-system/kube-proxy-vlxx6" Dec 13 01:54:54.373267 kubelet[2117]: I1213 01:54:54.373081 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-plzb2\" (UniqueName: \"kubernetes.io/projected/27919e61-b5be-42ea-85f2-a5a5d8497c3f-kube-api-access-plzb2\") pod \"kube-proxy-vlxx6\" (UID: \"27919e61-b5be-42ea-85f2-a5a5d8497c3f\") " pod="kube-system/kube-proxy-vlxx6" Dec 13 01:54:54.373267 kubelet[2117]: I1213 01:54:54.373108 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-xtables-lock\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373465 kubelet[2117]: I1213 01:54:54.373148 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hkbgd\" (UniqueName: \"kubernetes.io/projected/b8bfbd61-8e15-4058-a6ad-858fe1555dcb-kube-api-access-hkbgd\") pod \"csi-node-driver-b8h4x\" (UID: \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\") " pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:54:54.373465 kubelet[2117]: I1213 01:54:54.373223 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-lib-modules\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373465 kubelet[2117]: I1213 01:54:54.373254 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ee29b95-e2e1-46d4-b340-80d6712dbbde-tigera-ca-bundle\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373465 kubelet[2117]: I1213 01:54:54.373283 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b8bfbd61-8e15-4058-a6ad-858fe1555dcb-socket-dir\") pod \"csi-node-driver-b8h4x\" (UID: \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\") " pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:54:54.373465 kubelet[2117]: I1213 01:54:54.373312 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-cni-bin-dir\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373656 kubelet[2117]: I1213 01:54:54.373357 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b8bfbd61-8e15-4058-a6ad-858fe1555dcb-registration-dir\") pod \"csi-node-driver-b8h4x\" (UID: \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\") " pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:54:54.373656 kubelet[2117]: I1213 01:54:54.373388 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/27919e61-b5be-42ea-85f2-a5a5d8497c3f-lib-modules\") pod \"kube-proxy-vlxx6\" (UID: \"27919e61-b5be-42ea-85f2-a5a5d8497c3f\") " pod="kube-system/kube-proxy-vlxx6" Dec 13 01:54:54.373656 kubelet[2117]: I1213 01:54:54.373417 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-var-run-calico\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.373656 kubelet[2117]: I1213 01:54:54.373446 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2ee29b95-e2e1-46d4-b340-80d6712dbbde-var-lib-calico\") pod \"calico-node-9rkhb\" (UID: \"2ee29b95-e2e1-46d4-b340-80d6712dbbde\") " pod="calico-system/calico-node-9rkhb" Dec 13 01:54:54.478489 kubelet[2117]: E1213 01:54:54.478457 2117 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:54.478715 kubelet[2117]: W1213 01:54:54.478694 2117 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:54.478850 kubelet[2117]: E1213 01:54:54.478835 2117 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:54.486236 kubelet[2117]: E1213 01:54:54.486208 2117 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:54.486236 kubelet[2117]: W1213 01:54:54.486227 2117 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:54.486408 kubelet[2117]: E1213 01:54:54.486247 2117 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:54.506023 kubelet[2117]: E1213 01:54:54.505428 2117 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:54.506023 kubelet[2117]: W1213 01:54:54.505447 2117 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:54.506023 kubelet[2117]: E1213 01:54:54.505473 2117 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:54.507185 kubelet[2117]: E1213 01:54:54.507170 2117 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:54.507332 kubelet[2117]: W1213 01:54:54.507313 2117 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:54.507404 kubelet[2117]: E1213 01:54:54.507344 2117 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:54.507797 kubelet[2117]: E1213 01:54:54.507780 2117 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:54:54.507797 kubelet[2117]: W1213 01:54:54.507794 2117 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:54:54.507955 kubelet[2117]: E1213 01:54:54.507812 2117 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:54:54.647019 env[1551]: time="2024-12-13T01:54:54.646265845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9rkhb,Uid:2ee29b95-e2e1-46d4-b340-80d6712dbbde,Namespace:calico-system,Attempt:0,}" Dec 13 01:54:54.649134 env[1551]: time="2024-12-13T01:54:54.646278246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vlxx6,Uid:27919e61-b5be-42ea-85f2-a5a5d8497c3f,Namespace:kube-system,Attempt:0,}" Dec 13 01:54:55.337009 kubelet[2117]: E1213 01:54:55.336936 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:56.337115 kubelet[2117]: E1213 01:54:56.337058 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:56.443370 kubelet[2117]: E1213 01:54:56.443317 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:54:56.878089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2192351761.mount: Deactivated successfully. Dec 13 01:54:56.902425 env[1551]: time="2024-12-13T01:54:56.902367493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.904589 env[1551]: time="2024-12-13T01:54:56.904554231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.913130 env[1551]: time="2024-12-13T01:54:56.913095682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.915079 env[1551]: time="2024-12-13T01:54:56.915045617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.919199 env[1551]: time="2024-12-13T01:54:56.919163190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.921818 env[1551]: time="2024-12-13T01:54:56.921785936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.926029 env[1551]: time="2024-12-13T01:54:56.926000610Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.928311 env[1551]: time="2024-12-13T01:54:56.928279551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:56.994484 env[1551]: time="2024-12-13T01:54:56.991477468Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:56.994484 env[1551]: time="2024-12-13T01:54:56.991543769Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:56.994484 env[1551]: time="2024-12-13T01:54:56.991559569Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:56.994484 env[1551]: time="2024-12-13T01:54:56.991716072Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff8157c38d4730f49a62c510e036c81f4d2dca5af90907a410ed23c4257d4a07 pid=2167 runtime=io.containerd.runc.v2 Dec 13 01:54:56.994929 env[1551]: time="2024-12-13T01:54:56.993361201Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:54:56.994929 env[1551]: time="2024-12-13T01:54:56.993406502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:54:56.994929 env[1551]: time="2024-12-13T01:54:56.993417502Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:54:56.994929 env[1551]: time="2024-12-13T01:54:56.993569405Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1 pid=2179 runtime=io.containerd.runc.v2 Dec 13 01:54:57.063028 env[1551]: time="2024-12-13T01:54:57.062022685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vlxx6,Uid:27919e61-b5be-42ea-85f2-a5a5d8497c3f,Namespace:kube-system,Attempt:0,} returns sandbox id \"ff8157c38d4730f49a62c510e036c81f4d2dca5af90907a410ed23c4257d4a07\"" Dec 13 01:54:57.064215 env[1551]: time="2024-12-13T01:54:57.064171922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9rkhb,Uid:2ee29b95-e2e1-46d4-b340-80d6712dbbde,Namespace:calico-system,Attempt:0,} returns sandbox id \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\"" Dec 13 01:54:57.066776 env[1551]: time="2024-12-13T01:54:57.066753666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:54:57.337406 kubelet[2117]: E1213 01:54:57.337340 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:58.337960 kubelet[2117]: E1213 01:54:58.337910 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:58.416694 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1281016697.mount: Deactivated successfully. Dec 13 01:54:58.443004 kubelet[2117]: E1213 01:54:58.442114 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:54:58.580391 env[1551]: time="2024-12-13T01:54:58.580332411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.586498 env[1551]: time="2024-12-13T01:54:58.586452113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.589858 env[1551]: time="2024-12-13T01:54:58.589352562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.593732 env[1551]: time="2024-12-13T01:54:58.593702835Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:54:58.594156 env[1551]: time="2024-12-13T01:54:58.594106741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:54:58.596011 env[1551]: time="2024-12-13T01:54:58.595984673Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 01:54:58.597111 env[1551]: time="2024-12-13T01:54:58.597080791Z" level=info msg="CreateContainer within sandbox \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:54:58.643082 env[1551]: time="2024-12-13T01:54:58.643032959Z" level=info msg="CreateContainer within sandbox \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"85a42e519ffc9bdc6a35b288ee2f4d7383a50d43b5192c50bdfa583289c01ba3\"" Dec 13 01:54:58.643815 env[1551]: time="2024-12-13T01:54:58.643706871Z" level=info msg="StartContainer for \"85a42e519ffc9bdc6a35b288ee2f4d7383a50d43b5192c50bdfa583289c01ba3\"" Dec 13 01:54:58.706000 env[1551]: time="2024-12-13T01:54:58.704395085Z" level=info msg="StartContainer for \"85a42e519ffc9bdc6a35b288ee2f4d7383a50d43b5192c50bdfa583289c01ba3\" returns successfully" Dec 13 01:54:58.865945 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-85a42e519ffc9bdc6a35b288ee2f4d7383a50d43b5192c50bdfa583289c01ba3-rootfs.mount: Deactivated successfully. Dec 13 01:54:58.882379 env[1551]: time="2024-12-13T01:54:58.882328460Z" level=info msg="shim disconnected" id=85a42e519ffc9bdc6a35b288ee2f4d7383a50d43b5192c50bdfa583289c01ba3 Dec 13 01:54:58.882549 env[1551]: time="2024-12-13T01:54:58.882381861Z" level=warning msg="cleaning up after shim disconnected" id=85a42e519ffc9bdc6a35b288ee2f4d7383a50d43b5192c50bdfa583289c01ba3 namespace=k8s.io Dec 13 01:54:58.882549 env[1551]: time="2024-12-13T01:54:58.882395561Z" level=info msg="cleaning up dead shim" Dec 13 01:54:58.891187 env[1551]: time="2024-12-13T01:54:58.891146007Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:54:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2294 runtime=io.containerd.runc.v2\n" Dec 13 01:54:59.338257 kubelet[2117]: E1213 01:54:59.338226 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:54:59.870739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4184905277.mount: Deactivated successfully. Dec 13 01:55:00.339115 kubelet[2117]: E1213 01:55:00.339066 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:00.437419 env[1551]: time="2024-12-13T01:55:00.437360006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:00.443000 kubelet[2117]: E1213 01:55:00.442382 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:55:00.444087 env[1551]: time="2024-12-13T01:55:00.444051512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:00.446918 env[1551]: time="2024-12-13T01:55:00.446884756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:00.450839 env[1551]: time="2024-12-13T01:55:00.450806218Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:00.451285 env[1551]: time="2024-12-13T01:55:00.451254825Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 01:55:00.452668 env[1551]: time="2024-12-13T01:55:00.452635047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:55:00.453499 env[1551]: time="2024-12-13T01:55:00.453469960Z" level=info msg="CreateContainer within sandbox \"ff8157c38d4730f49a62c510e036c81f4d2dca5af90907a410ed23c4257d4a07\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:55:00.482387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount468729030.mount: Deactivated successfully. Dec 13 01:55:00.491572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2968252089.mount: Deactivated successfully. Dec 13 01:55:00.504546 env[1551]: time="2024-12-13T01:55:00.504496868Z" level=info msg="CreateContainer within sandbox \"ff8157c38d4730f49a62c510e036c81f4d2dca5af90907a410ed23c4257d4a07\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2775c555b9325dcc595330f80fe8dd306b495bc153286679febff0e1c458c0ce\"" Dec 13 01:55:00.505264 env[1551]: time="2024-12-13T01:55:00.505231979Z" level=info msg="StartContainer for \"2775c555b9325dcc595330f80fe8dd306b495bc153286679febff0e1c458c0ce\"" Dec 13 01:55:00.560055 env[1551]: time="2024-12-13T01:55:00.559963445Z" level=info msg="StartContainer for \"2775c555b9325dcc595330f80fe8dd306b495bc153286679febff0e1c458c0ce\" returns successfully" Dec 13 01:55:00.615005 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 01:55:00.615140 kernel: audit: type=1325 audit(1734054900.609:203): table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.609000 audit[2369]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.609000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc719ef4c0 a2=0 a3=7ffc719ef4ac items=0 ppid=2329 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.644376 kernel: audit: type=1300 audit(1734054900.609:203): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc719ef4c0 a2=0 a3=7ffc719ef4ac items=0 ppid=2329 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.644544 kernel: audit: type=1327 audit(1734054900.609:203): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:55:00.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:55:00.614000 audit[2370]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:00.663574 kernel: audit: type=1325 audit(1734054900.614:204): table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:00.663664 kernel: audit: type=1300 audit(1734054900.614:204): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2f1e3ae0 a2=0 a3=7fff2f1e3acc items=0 ppid=2329 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.614000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2f1e3ae0 a2=0 a3=7fff2f1e3acc items=0 ppid=2329 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:55:00.692019 kernel: audit: type=1327 audit(1734054900.614:204): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:55:00.692122 kernel: audit: type=1325 audit(1734054900.619:205): table=nat:19 family=2 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.619000 audit[2371]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.706998 kernel: audit: type=1300 audit(1734054900.619:205): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0a5a83b0 a2=0 a3=7ffc0a5a839c items=0 ppid=2329 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.619000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0a5a83b0 a2=0 a3=7ffc0a5a839c items=0 ppid=2329 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:55:00.732088 kernel: audit: type=1327 audit(1734054900.619:205): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:55:00.619000 audit[2372]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:00.743425 kernel: audit: type=1325 audit(1734054900.619:206): table=nat:20 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:00.619000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1d96dfe0 a2=0 a3=7ffe1d96dfcc items=0 ppid=2329 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:55:00.619000 audit[2373]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.619000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe145ea2e0 a2=0 a3=7ffe145ea2cc items=0 ppid=2329 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:55:00.624000 audit[2374]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:00.624000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5c3931e0 a2=0 a3=7ffd5c3931cc items=0 ppid=2329 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:55:00.721000 audit[2375]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.721000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0f7a3410 a2=0 a3=7ffd0f7a33fc items=0 ppid=2329 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:55:00.724000 audit[2377]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.724000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcd76a2770 a2=0 a3=7ffcd76a275c items=0 ppid=2329 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:55:00.728000 audit[2380]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.728000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff30a22070 a2=0 a3=7fff30a2205c items=0 ppid=2329 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:55:00.729000 audit[2381]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.729000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3f3bafb0 a2=0 a3=7ffc3f3baf9c items=0 ppid=2329 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:55:00.732000 audit[2383]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.732000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc89d24bb0 a2=0 a3=7ffc89d24b9c items=0 ppid=2329 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:55:00.734000 audit[2384]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.734000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7c5a3050 a2=0 a3=7ffe7c5a303c items=0 ppid=2329 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:55:00.736000 audit[2386]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.736000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe90aff370 a2=0 a3=7ffe90aff35c items=0 ppid=2329 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:55:00.741000 audit[2389]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.741000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffbc33f9c0 a2=0 a3=7fffbc33f9ac items=0 ppid=2329 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:55:00.743000 audit[2390]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.743000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec7146d90 a2=0 a3=7ffec7146d7c items=0 ppid=2329 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:55:00.746000 audit[2392]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.746000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd414f3220 a2=0 a3=7ffd414f320c items=0 ppid=2329 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:55:00.747000 audit[2393]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.747000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3a96a460 a2=0 a3=7ffe3a96a44c items=0 ppid=2329 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:55:00.751000 audit[2395]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.751000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff85be9010 a2=0 a3=7fff85be8ffc items=0 ppid=2329 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:55:00.755000 audit[2398]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.755000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdaa059370 a2=0 a3=7ffdaa05935c items=0 ppid=2329 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:55:00.759000 audit[2401]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.759000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb77eaf10 a2=0 a3=7ffdb77eaefc items=0 ppid=2329 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:55:00.760000 audit[2402]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.760000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1483cec0 a2=0 a3=7fff1483ceac items=0 ppid=2329 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:55:00.762000 audit[2404]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.762000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd5c82d70 a2=0 a3=7ffdd5c82d5c items=0 ppid=2329 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:00.841000 audit[2409]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.841000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc74ddc210 a2=0 a3=7ffc74ddc1fc items=0 ppid=2329 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:00.842000 audit[2410]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.842000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7e630390 a2=0 a3=7fff7e63037c items=0 ppid=2329 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:55:00.845000 audit[2412]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:55:00.845000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff362d9760 a2=0 a3=7fff362d974c items=0 ppid=2329 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:55:00.874000 audit[2418]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:00.874000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffda95f33f0 a2=0 a3=7ffda95f33dc items=0 ppid=2329 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:00.957000 audit[2418]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:00.957000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffda95f33f0 a2=0 a3=7ffda95f33dc items=0 ppid=2329 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:00.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:01.006000 audit[2426]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.006000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcfe915bd0 a2=0 a3=7ffcfe915bbc items=0 ppid=2329 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:55:01.009000 audit[2428]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.009000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcae446240 a2=0 a3=7ffcae44622c items=0 ppid=2329 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:55:01.013000 audit[2431]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.013000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9514ac20 a2=0 a3=7ffc9514ac0c items=0 ppid=2329 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:55:01.014000 audit[2432]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.014000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3f0df7c0 a2=0 a3=7ffe3f0df7ac items=0 ppid=2329 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:55:01.017000 audit[2434]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.017000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff90bd0730 a2=0 a3=7fff90bd071c items=0 ppid=2329 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:55:01.018000 audit[2435]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.018000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc71dd4440 a2=0 a3=7ffc71dd442c items=0 ppid=2329 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:55:01.020000 audit[2437]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.020000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffddffc2b50 a2=0 a3=7ffddffc2b3c items=0 ppid=2329 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:55:01.024000 audit[2440]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.024000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffee582ff00 a2=0 a3=7ffee582feec items=0 ppid=2329 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:55:01.025000 audit[2441]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.025000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5919b6c0 a2=0 a3=7ffc5919b6ac items=0 ppid=2329 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:55:01.028000 audit[2443]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.028000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd95511800 a2=0 a3=7ffd955117ec items=0 ppid=2329 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:55:01.029000 audit[2444]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.029000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1ccba8e0 a2=0 a3=7ffd1ccba8cc items=0 ppid=2329 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:55:01.031000 audit[2446]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.031000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7f42cf70 a2=0 a3=7ffe7f42cf5c items=0 ppid=2329 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:55:01.035000 audit[2449]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.035000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd916935b0 a2=0 a3=7ffd9169359c items=0 ppid=2329 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:55:01.038000 audit[2452]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.038000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9bc5b340 a2=0 a3=7ffc9bc5b32c items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:55:01.040000 audit[2453]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.040000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8b4611c0 a2=0 a3=7ffd8b4611ac items=0 ppid=2329 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:55:01.042000 audit[2455]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.042000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff85debf30 a2=0 a3=7fff85debf1c items=0 ppid=2329 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:01.046000 audit[2458]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.046000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe6a678120 a2=0 a3=7ffe6a67810c items=0 ppid=2329 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:55:01.047000 audit[2459]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.047000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe6e35650 a2=0 a3=7fffe6e3563c items=0 ppid=2329 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:55:01.049000 audit[2461]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.049000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7c576090 a2=0 a3=7ffe7c57607c items=0 ppid=2329 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:55:01.050000 audit[2462]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.050000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffa1d2810 a2=0 a3=7ffffa1d27fc items=0 ppid=2329 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:55:01.053000 audit[2464]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.053000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0b673950 a2=0 a3=7ffe0b67393c items=0 ppid=2329 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:55:01.057000 audit[2467]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:55:01.057000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4eae9af0 a2=0 a3=7ffc4eae9adc items=0 ppid=2329 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:55:01.060000 audit[2469]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:55:01.060000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdf6b30c20 a2=0 a3=7ffdf6b30c0c items=0 ppid=2329 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.060000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:01.061000 audit[2469]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:55:01.061000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdf6b30c20 a2=0 a3=7ffdf6b30c0c items=0 ppid=2329 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:01.061000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:01.340324 kubelet[2117]: E1213 01:55:01.340260 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:01.479844 kubelet[2117]: I1213 01:55:01.479722 2117 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vlxx6" podStartSLOduration=6.093412297 podStartE2EDuration="9.479675286s" podCreationTimestamp="2024-12-13 01:54:52 +0000 UTC" firstStartedPulling="2024-12-13 01:54:57.065406943 +0000 UTC m=+5.810010514" lastFinishedPulling="2024-12-13 01:55:00.451669932 +0000 UTC m=+9.196273503" observedRunningTime="2024-12-13 01:55:01.479407082 +0000 UTC m=+10.224010653" watchObservedRunningTime="2024-12-13 01:55:01.479675286 +0000 UTC m=+10.224278857" Dec 13 01:55:02.341461 kubelet[2117]: E1213 01:55:02.341412 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:02.443219 kubelet[2117]: E1213 01:55:02.443180 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:55:03.341881 kubelet[2117]: E1213 01:55:03.341841 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:04.342491 kubelet[2117]: E1213 01:55:04.342452 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:04.444896 kubelet[2117]: E1213 01:55:04.444868 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:55:05.343422 kubelet[2117]: E1213 01:55:05.343345 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:06.248622 env[1551]: time="2024-12-13T01:55:06.248559965Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:06.255639 env[1551]: time="2024-12-13T01:55:06.255595560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:06.260513 env[1551]: time="2024-12-13T01:55:06.260476825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:06.264314 env[1551]: time="2024-12-13T01:55:06.264282277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:06.264858 env[1551]: time="2024-12-13T01:55:06.264677282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:55:06.266841 env[1551]: time="2024-12-13T01:55:06.266805910Z" level=info msg="CreateContainer within sandbox \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:55:06.293558 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2412941802.mount: Deactivated successfully. Dec 13 01:55:06.311438 env[1551]: time="2024-12-13T01:55:06.311374109Z" level=info msg="CreateContainer within sandbox \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"67e50a7866ba562f48ee1c7ce78fab438e1cc3905bee2fb90c99212fe2cdcf7e\"" Dec 13 01:55:06.312162 env[1551]: time="2024-12-13T01:55:06.312130019Z" level=info msg="StartContainer for \"67e50a7866ba562f48ee1c7ce78fab438e1cc3905bee2fb90c99212fe2cdcf7e\"" Dec 13 01:55:06.344467 kubelet[2117]: E1213 01:55:06.344389 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:06.375982 env[1551]: time="2024-12-13T01:55:06.375927376Z" level=info msg="StartContainer for \"67e50a7866ba562f48ee1c7ce78fab438e1cc3905bee2fb90c99212fe2cdcf7e\" returns successfully" Dec 13 01:55:06.443063 kubelet[2117]: E1213 01:55:06.442630 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:55:07.344693 kubelet[2117]: E1213 01:55:07.344634 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:07.750849 env[1551]: time="2024-12-13T01:55:07.750774880Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 01:55:07.770569 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-67e50a7866ba562f48ee1c7ce78fab438e1cc3905bee2fb90c99212fe2cdcf7e-rootfs.mount: Deactivated successfully. Dec 13 01:55:07.794432 kubelet[2117]: I1213 01:55:07.794189 2117 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 01:55:08.345837 kubelet[2117]: E1213 01:55:08.345779 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:08.446211 env[1551]: time="2024-12-13T01:55:08.446153823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b8h4x,Uid:b8bfbd61-8e15-4058-a6ad-858fe1555dcb,Namespace:calico-system,Attempt:0,}" Dec 13 01:55:09.346282 kubelet[2117]: E1213 01:55:09.346231 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:10.175566 env[1551]: time="2024-12-13T01:55:10.175510017Z" level=info msg="shim disconnected" id=67e50a7866ba562f48ee1c7ce78fab438e1cc3905bee2fb90c99212fe2cdcf7e Dec 13 01:55:10.175566 env[1551]: time="2024-12-13T01:55:10.175564717Z" level=warning msg="cleaning up after shim disconnected" id=67e50a7866ba562f48ee1c7ce78fab438e1cc3905bee2fb90c99212fe2cdcf7e namespace=k8s.io Dec 13 01:55:10.175566 env[1551]: time="2024-12-13T01:55:10.175579517Z" level=info msg="cleaning up dead shim" Dec 13 01:55:10.184273 env[1551]: time="2024-12-13T01:55:10.184228022Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:55:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2517 runtime=io.containerd.runc.v2\n" Dec 13 01:55:10.254702 env[1551]: time="2024-12-13T01:55:10.254620272Z" level=error msg="Failed to destroy network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:10.259149 env[1551]: time="2024-12-13T01:55:10.255037877Z" level=error msg="encountered an error cleaning up failed sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:10.259149 env[1551]: time="2024-12-13T01:55:10.255100378Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b8h4x,Uid:b8bfbd61-8e15-4058-a6ad-858fe1555dcb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:10.256893 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935-shm.mount: Deactivated successfully. Dec 13 01:55:10.259583 kubelet[2117]: E1213 01:55:10.255384 2117 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:10.259583 kubelet[2117]: E1213 01:55:10.255459 2117 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:55:10.259583 kubelet[2117]: E1213 01:55:10.255488 2117 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b8h4x" Dec 13 01:55:10.259727 kubelet[2117]: E1213 01:55:10.255552 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-b8h4x_calico-system(b8bfbd61-8e15-4058-a6ad-858fe1555dcb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-b8h4x_calico-system(b8bfbd61-8e15-4058-a6ad-858fe1555dcb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:55:10.346787 kubelet[2117]: E1213 01:55:10.346725 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:10.492133 env[1551]: time="2024-12-13T01:55:10.492074441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:55:10.492333 kubelet[2117]: I1213 01:55:10.492176 2117 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:10.492940 env[1551]: time="2024-12-13T01:55:10.492907051Z" level=info msg="StopPodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\"" Dec 13 01:55:10.521792 env[1551]: time="2024-12-13T01:55:10.521729999Z" level=error msg="StopPodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" failed" error="failed to destroy network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:10.522063 kubelet[2117]: E1213 01:55:10.522041 2117 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:10.522172 kubelet[2117]: E1213 01:55:10.522139 2117 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935"} Dec 13 01:55:10.522221 kubelet[2117]: E1213 01:55:10.522193 2117 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:10.522306 kubelet[2117]: E1213 01:55:10.522236 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b8bfbd61-8e15-4058-a6ad-858fe1555dcb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b8h4x" podUID="b8bfbd61-8e15-4058-a6ad-858fe1555dcb" Dec 13 01:55:11.347358 kubelet[2117]: E1213 01:55:11.347291 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:12.329601 kubelet[2117]: E1213 01:55:12.329539 2117 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:12.347788 kubelet[2117]: E1213 01:55:12.347713 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:13.348841 kubelet[2117]: E1213 01:55:13.348779 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:14.349373 kubelet[2117]: E1213 01:55:14.349314 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:15.068506 kubelet[2117]: I1213 01:55:15.068454 2117 topology_manager.go:215] "Topology Admit Handler" podUID="6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6" podNamespace="default" podName="nginx-deployment-6d5f899847-2dbg2" Dec 13 01:55:15.122522 kubelet[2117]: I1213 01:55:15.122472 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6v6js\" (UniqueName: \"kubernetes.io/projected/6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6-kube-api-access-6v6js\") pod \"nginx-deployment-6d5f899847-2dbg2\" (UID: \"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6\") " pod="default/nginx-deployment-6d5f899847-2dbg2" Dec 13 01:55:15.350443 kubelet[2117]: E1213 01:55:15.350031 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:15.372996 env[1551]: time="2024-12-13T01:55:15.372921329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2dbg2,Uid:6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6,Namespace:default,Attempt:0,}" Dec 13 01:55:15.534016 env[1551]: time="2024-12-13T01:55:15.533928838Z" level=error msg="Failed to destroy network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:15.538120 env[1551]: time="2024-12-13T01:55:15.537193672Z" level=error msg="encountered an error cleaning up failed sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:15.536955 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6-shm.mount: Deactivated successfully. Dec 13 01:55:15.538480 env[1551]: time="2024-12-13T01:55:15.537714278Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2dbg2,Uid:6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:15.538687 kubelet[2117]: E1213 01:55:15.538664 2117 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:15.538762 kubelet[2117]: E1213 01:55:15.538734 2117 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-2dbg2" Dec 13 01:55:15.538813 kubelet[2117]: E1213 01:55:15.538762 2117 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-2dbg2" Dec 13 01:55:15.538853 kubelet[2117]: E1213 01:55:15.538831 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-2dbg2_default(6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-2dbg2_default(6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-2dbg2" podUID="6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6" Dec 13 01:55:16.351118 kubelet[2117]: E1213 01:55:16.351046 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:16.504998 kubelet[2117]: I1213 01:55:16.504826 2117 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:16.505814 env[1551]: time="2024-12-13T01:55:16.505773315Z" level=info msg="StopPodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\"" Dec 13 01:55:16.568158 env[1551]: time="2024-12-13T01:55:16.568091060Z" level=error msg="StopPodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" failed" error="failed to destroy network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:55:16.568792 kubelet[2117]: E1213 01:55:16.568594 2117 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:16.568792 kubelet[2117]: E1213 01:55:16.568646 2117 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6"} Dec 13 01:55:16.568792 kubelet[2117]: E1213 01:55:16.568696 2117 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:55:16.568792 kubelet[2117]: E1213 01:55:16.568735 2117 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-2dbg2" podUID="6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6" Dec 13 01:55:17.351449 kubelet[2117]: E1213 01:55:17.351401 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:18.352128 kubelet[2117]: E1213 01:55:18.352068 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:18.856457 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3825472110.mount: Deactivated successfully. Dec 13 01:55:18.902356 env[1551]: time="2024-12-13T01:55:18.902306190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:18.908439 env[1551]: time="2024-12-13T01:55:18.908398950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:18.911404 env[1551]: time="2024-12-13T01:55:18.911369779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:18.915292 env[1551]: time="2024-12-13T01:55:18.915257817Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:18.915701 env[1551]: time="2024-12-13T01:55:18.915669521Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:55:18.933776 env[1551]: time="2024-12-13T01:55:18.933734599Z" level=info msg="CreateContainer within sandbox \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:55:18.976490 env[1551]: time="2024-12-13T01:55:18.976431919Z" level=info msg="CreateContainer within sandbox \"7c224b4b0df494249b2060e73db118430959fc7c1ea391b3f5453ef20ddabdb1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9e01db4fcd2b9a58499700beb251d02ddc138da6c19af011c11aeb00a6311344\"" Dec 13 01:55:18.977161 env[1551]: time="2024-12-13T01:55:18.977109826Z" level=info msg="StartContainer for \"9e01db4fcd2b9a58499700beb251d02ddc138da6c19af011c11aeb00a6311344\"" Dec 13 01:55:19.037993 env[1551]: time="2024-12-13T01:55:19.035153688Z" level=info msg="StartContainer for \"9e01db4fcd2b9a58499700beb251d02ddc138da6c19af011c11aeb00a6311344\" returns successfully" Dec 13 01:55:19.255658 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:55:19.255829 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:55:19.352748 kubelet[2117]: E1213 01:55:19.352683 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:20.353220 kubelet[2117]: E1213 01:55:20.353169 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:20.529000 audit[2773]: AVC avc: denied { write } for pid=2773 comm="tee" name="fd" dev="proc" ino=23643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.539995 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 01:55:20.540120 kernel: audit: type=1400 audit(1734054920.529:254): avc: denied { write } for pid=2773 comm="tee" name="fd" dev="proc" ino=23643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.560687 systemd[1]: run-containerd-runc-k8s.io-9e01db4fcd2b9a58499700beb251d02ddc138da6c19af011c11aeb00a6311344-runc.uDJRxs.mount: Deactivated successfully. Dec 13 01:55:20.529000 audit[2773]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda609da0a a2=241 a3=1b6 items=1 ppid=2735 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.603023 kernel: audit: type=1300 audit(1734054920.529:254): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda609da0a a2=241 a3=1b6 items=1 ppid=2735 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.529000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:55:20.631003 kernel: audit: type=1307 audit(1734054920.529:254): cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:55:20.529000 audit: PATH item=0 name="/dev/fd/63" inode=23618 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.653091 kernel: audit: type=1302 audit(1734054920.529:254): item=0 name="/dev/fd/63" inode=23618 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.679998 kernel: audit: type=1327 audit(1734054920.529:254): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.544000 audit[2770]: AVC avc: denied { write } for pid=2770 comm="tee" name="fd" dev="proc" ino=23687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.708097 kernel: audit: type=1400 audit(1734054920.544:255): avc: denied { write } for pid=2770 comm="tee" name="fd" dev="proc" ino=23687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.544000 audit[2770]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e273a19 a2=241 a3=1b6 items=1 ppid=2737 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.729081 kernel: audit: type=1300 audit(1734054920.544:255): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e273a19 a2=241 a3=1b6 items=1 ppid=2737 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.544000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:55:20.739084 kernel: audit: type=1307 audit(1734054920.544:255): cwd="/etc/service/enabled/bird6/log" Dec 13 01:55:20.739185 kernel: audit: type=1302 audit(1734054920.544:255): item=0 name="/dev/fd/63" inode=23615 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.544000 audit: PATH item=0 name="/dev/fd/63" inode=23615 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.544000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.769062 kernel: audit: type=1327 audit(1734054920.544:255): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.573000 audit[2778]: AVC avc: denied { write } for pid=2778 comm="tee" name="fd" dev="proc" ino=23701 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.573000 audit[2778]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9e4f5a19 a2=241 a3=1b6 items=1 ppid=2739 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.573000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:55:20.573000 audit: PATH item=0 name="/dev/fd/63" inode=23626 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.573000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.591000 audit[2784]: AVC avc: denied { write } for pid=2784 comm="tee" name="fd" dev="proc" ino=23709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.591000 audit[2784]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd24b9fa1b a2=241 a3=1b6 items=1 ppid=2733 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.591000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:55:20.591000 audit: PATH item=0 name="/dev/fd/63" inode=23640 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.591000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.596000 audit[2799]: AVC avc: denied { write } for pid=2799 comm="tee" name="fd" dev="proc" ino=23713 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.596000 audit[2799]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2ac9ca1a a2=241 a3=1b6 items=1 ppid=2748 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.596000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:55:20.596000 audit: PATH item=0 name="/dev/fd/63" inode=23705 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.596000 audit[2801]: AVC avc: denied { write } for pid=2801 comm="tee" name="fd" dev="proc" ino=23720 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.596000 audit[2801]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff09a76a19 a2=241 a3=1b6 items=1 ppid=2753 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.596000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:55:20.596000 audit: PATH item=0 name="/dev/fd/63" inode=23708 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.614000 audit[2807]: AVC avc: denied { write } for pid=2807 comm="tee" name="fd" dev="proc" ino=23725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:55:20.614000 audit[2807]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7a77ea09 a2=241 a3=1b6 items=1 ppid=2750 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.614000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:55:20.614000 audit: PATH item=0 name="/dev/fd/63" inode=23717 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:55:20.614000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit: BPF prog-id=10 op=LOAD Dec 13 01:55:20.858000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2e9999e0 a2=98 a3=3 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.858000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit: BPF prog-id=11 op=LOAD Dec 13 01:55:20.858000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2e9997c0 a2=74 a3=540051 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.858000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.858000 audit: BPF prog-id=12 op=LOAD Dec 13 01:55:20.858000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2e9997f0 a2=94 a3=2 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.858000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit: BPF prog-id=13 op=LOAD Dec 13 01:55:20.969000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2e9996b0 a2=40 a3=1 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.969000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.969000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:55:20.969000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.969000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc2e999780 a2=50 a3=7ffc2e999860 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.969000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.978000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.978000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e9996c0 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.978000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2e9996f0 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2e999600 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e999710 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e9996f0 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e9996e0 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e999710 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2e9996f0 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2e999710 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2e9996e0 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e999750 a2=28 a3=0 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2e999500 a2=50 a3=1 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit: BPF prog-id=14 op=LOAD Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2e999500 a2=94 a3=5 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2e9995b0 a2=50 a3=1 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc2e9996d0 a2=4 a3=38 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.979000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:20.979000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2e999720 a2=94 a3=6 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:20.980000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2e998ed0 a2=94 a3=83 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.980000 audit[2860]: AVC avc: denied { confidentiality } for pid=2860 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:20.980000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2e998ed0 a2=94 a3=83 items=0 ppid=2755 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.988000 audit: BPF prog-id=15 op=LOAD Dec 13 01:55:20.988000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8575ae10 a2=98 a3=1999999999999999 items=0 ppid=2755 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.988000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:55:20.989000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit: BPF prog-id=16 op=LOAD Dec 13 01:55:20.989000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8575acf0 a2=74 a3=ffff items=0 ppid=2755 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.989000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:55:20.989000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { perfmon } for pid=2863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit[2863]: AVC avc: denied { bpf } for pid=2863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:20.989000 audit: BPF prog-id=17 op=LOAD Dec 13 01:55:20.989000 audit[2863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8575ad30 a2=40 a3=7ffc8575af10 items=0 ppid=2755 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:20.989000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:55:20.989000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:55:21.099229 systemd-networkd[1703]: vxlan.calico: Link UP Dec 13 01:55:21.099243 systemd-networkd[1703]: vxlan.calico: Gained carrier Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit: BPF prog-id=18 op=LOAD Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe10aa7f30 a2=98 a3=ffffffff items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit: BPF prog-id=19 op=LOAD Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe10aa7d40 a2=74 a3=540051 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit: BPF prog-id=20 op=LOAD Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe10aa7d70 a2=94 a3=2 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe10aa7c40 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe10aa7c70 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe10aa7b80 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe10aa7c90 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe10aa7c70 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe10aa7c60 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe10aa7c90 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe10aa7c70 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.123000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.123000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe10aa7c90 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe10aa7c60 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe10aa7cd0 a2=28 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit: BPF prog-id=21 op=LOAD Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe10aa7b40 a2=40 a3=0 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe10aa7b30 a2=50 a3=2800 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe10aa7b30 a2=50 a3=2800 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit: BPF prog-id=22 op=LOAD Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe10aa7350 a2=94 a3=2 items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.124000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.124000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe10aa7450 a2=94 a3=2d items=0 ppid=2755 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit: BPF prog-id=24 op=LOAD Dec 13 01:55:21.128000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6ea5b1d0 a2=98 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.128000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.128000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit: BPF prog-id=25 op=LOAD Dec 13 01:55:21.128000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6ea5afb0 a2=74 a3=540051 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.128000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.128000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.128000 audit: BPF prog-id=26 op=LOAD Dec 13 01:55:21.128000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6ea5afe0 a2=94 a3=2 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.128000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.128000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.251000 audit: BPF prog-id=27 op=LOAD Dec 13 01:55:21.251000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6ea5aea0 a2=40 a3=1 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.251000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.252000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:55:21.252000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.252000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6ea5af70 a2=50 a3=7fff6ea5b050 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea5aeb0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6ea5aee0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6ea5adf0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea5af00 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea5aee0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea5aed0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea5af00 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6ea5aee0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6ea5af00 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.265000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.265000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6ea5aed0 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea5af40 a2=28 a3=0 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6ea5acf0 a2=50 a3=1 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit: BPF prog-id=28 op=LOAD Dec 13 01:55:21.266000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6ea5acf0 a2=94 a3=5 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.266000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6ea5ada0 a2=50 a3=1 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff6ea5aec0 a2=4 a3=38 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.266000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:21.266000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6ea5af10 a2=94 a3=6 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:21.267000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6ea5a6c0 a2=94 a3=83 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:55:21.267000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6ea5a6c0 a2=94 a3=83 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.267000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.267000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6ea5c100 a2=10 a3=f1f00800 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.268000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.268000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6ea5bfa0 a2=10 a3=3 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.268000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.268000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6ea5bf40 a2=10 a3=3 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.268000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:55:21.268000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6ea5bf40 a2=10 a3=7 items=0 ppid=2755 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:55:21.274000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:55:21.354252 kubelet[2117]: E1213 01:55:21.354197 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:21.443987 env[1551]: time="2024-12-13T01:55:21.443919061Z" level=info msg="StopPodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\"" Dec 13 01:55:21.461000 audit[2938]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:21.461000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc938d54a0 a2=0 a3=7ffc938d548c items=0 ppid=2755 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.461000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:21.508844 kubelet[2117]: I1213 01:55:21.504995 2117 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-9rkhb" podStartSLOduration=7.654232135 podStartE2EDuration="29.504934918s" podCreationTimestamp="2024-12-13 01:54:52 +0000 UTC" firstStartedPulling="2024-12-13 01:54:57.065256341 +0000 UTC m=+5.809859912" lastFinishedPulling="2024-12-13 01:55:18.915959124 +0000 UTC m=+27.660562695" observedRunningTime="2024-12-13 01:55:19.52837802 +0000 UTC m=+28.272981591" watchObservedRunningTime="2024-12-13 01:55:21.504934918 +0000 UTC m=+30.249538489" Dec 13 01:55:21.510000 audit[2939]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:21.510000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff7da90cb0 a2=0 a3=7fff7da90c9c items=0 ppid=2755 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:21.511000 audit[2941]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:21.511000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc075a7b40 a2=0 a3=7ffc075a7b2c items=0 ppid=2755 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.511000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:21.513000 audit[2937]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:21.513000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff3df941f0 a2=0 a3=7fff3df941dc items=0 ppid=2755 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.523 [INFO][2932] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.523 [INFO][2932] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" iface="eth0" netns="/var/run/netns/cni-79a2d2db-e8e4-19f6-a9eb-2a6432a6693e" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.523 [INFO][2932] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" iface="eth0" netns="/var/run/netns/cni-79a2d2db-e8e4-19f6-a9eb-2a6432a6693e" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.523 [INFO][2932] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" iface="eth0" netns="/var/run/netns/cni-79a2d2db-e8e4-19f6-a9eb-2a6432a6693e" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.524 [INFO][2932] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.524 [INFO][2932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.546 [INFO][2951] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.546 [INFO][2951] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.546 [INFO][2951] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.552 [WARNING][2951] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.552 [INFO][2951] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.553 [INFO][2951] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:21.556605 env[1551]: 2024-12-13 01:55:21.555 [INFO][2932] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:21.561226 env[1551]: time="2024-12-13T01:55:21.559792019Z" level=info msg="TearDown network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" successfully" Dec 13 01:55:21.561226 env[1551]: time="2024-12-13T01:55:21.560282724Z" level=info msg="StopPodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" returns successfully" Dec 13 01:55:21.559594 systemd[1]: run-netns-cni\x2d79a2d2db\x2de8e4\x2d19f6\x2da9eb\x2d2a6432a6693e.mount: Deactivated successfully. Dec 13 01:55:21.561744 env[1551]: time="2024-12-13T01:55:21.561712337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b8h4x,Uid:b8bfbd61-8e15-4058-a6ad-858fe1555dcb,Namespace:calico-system,Attempt:1,}" Dec 13 01:55:21.705342 systemd-networkd[1703]: calib383a1b0c45: Link UP Dec 13 01:55:21.711010 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib383a1b0c45: link becomes ready Dec 13 01:55:21.710008 systemd-networkd[1703]: calib383a1b0c45: Gained carrier Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.638 [INFO][2959] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-csi--node--driver--b8h4x-eth0 csi-node-driver- calico-system b8bfbd61-8e15-4058-a6ad-858fe1555dcb 1264 0 2024-12-13 01:54:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.13 csi-node-driver-b8h4x eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib383a1b0c45 [] []}} ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.638 [INFO][2959] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.667 [INFO][2971] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" HandleID="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.676 [INFO][2971] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" HandleID="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318d50), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.13", "pod":"csi-node-driver-b8h4x", "timestamp":"2024-12-13 01:55:21.667666404 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.676 [INFO][2971] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.676 [INFO][2971] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.676 [INFO][2971] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.678 [INFO][2971] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.681 [INFO][2971] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.685 [INFO][2971] ipam/ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.686 [INFO][2971] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.688 [INFO][2971] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.688 [INFO][2971] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.689 [INFO][2971] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68 Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.693 [INFO][2971] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.701 [INFO][2971] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.193/26] block=192.168.17.192/26 handle="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.702 [INFO][2971] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.193/26] handle="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" host="10.200.8.13" Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.702 [INFO][2971] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:21.722415 env[1551]: 2024-12-13 01:55:21.702 [INFO][2971] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.193/26] IPv6=[] ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" HandleID="k8s-pod-network.e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.723326 env[1551]: 2024-12-13 01:55:21.703 [INFO][2959] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--b8h4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b8bfbd61-8e15-4058-a6ad-858fe1555dcb", ResourceVersion:"1264", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"csi-node-driver-b8h4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib383a1b0c45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:21.723326 env[1551]: 2024-12-13 01:55:21.703 [INFO][2959] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.193/32] ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.723326 env[1551]: 2024-12-13 01:55:21.703 [INFO][2959] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib383a1b0c45 ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.723326 env[1551]: 2024-12-13 01:55:21.711 [INFO][2959] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.723326 env[1551]: 2024-12-13 01:55:21.711 [INFO][2959] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--b8h4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b8bfbd61-8e15-4058-a6ad-858fe1555dcb", ResourceVersion:"1264", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68", Pod:"csi-node-driver-b8h4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib383a1b0c45", MAC:"ea:0d:24:13:db:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:21.723326 env[1551]: 2024-12-13 01:55:21.720 [INFO][2959] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68" Namespace="calico-system" Pod="csi-node-driver-b8h4x" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:21.734000 audit[2991]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:21.734000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd4d13a0a0 a2=0 a3=7ffd4d13a08c items=0 ppid=2755 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:21.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:21.742364 env[1551]: time="2024-12-13T01:55:21.742302086Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:21.742573 env[1551]: time="2024-12-13T01:55:21.742339186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:21.742573 env[1551]: time="2024-12-13T01:55:21.742352586Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:21.742573 env[1551]: time="2024-12-13T01:55:21.742491788Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68 pid=3000 runtime=io.containerd.runc.v2 Dec 13 01:55:21.788788 env[1551]: time="2024-12-13T01:55:21.788739410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b8h4x,Uid:b8bfbd61-8e15-4058-a6ad-858fe1555dcb,Namespace:calico-system,Attempt:1,} returns sandbox id \"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68\"" Dec 13 01:55:21.790556 env[1551]: time="2024-12-13T01:55:21.790528126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:55:22.355272 kubelet[2117]: E1213 01:55:22.355200 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:22.799181 systemd-networkd[1703]: vxlan.calico: Gained IPv6LL Dec 13 01:55:23.355018 env[1551]: time="2024-12-13T01:55:23.354951939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:23.356257 kubelet[2117]: E1213 01:55:23.356212 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:23.362804 env[1551]: time="2024-12-13T01:55:23.362761207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:23.368964 env[1551]: time="2024-12-13T01:55:23.368910560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:23.372772 env[1551]: time="2024-12-13T01:55:23.372738093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:23.373237 env[1551]: time="2024-12-13T01:55:23.373206097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:55:23.375174 env[1551]: time="2024-12-13T01:55:23.375142414Z" level=info msg="CreateContainer within sandbox \"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:55:23.416980 env[1551]: time="2024-12-13T01:55:23.416907777Z" level=info msg="CreateContainer within sandbox \"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ecf3fac08fac08b4dc95c2162ad0fa598a10f6022535d09fa14415a9e1184c58\"" Dec 13 01:55:23.417658 env[1551]: time="2024-12-13T01:55:23.417556283Z" level=info msg="StartContainer for \"ecf3fac08fac08b4dc95c2162ad0fa598a10f6022535d09fa14415a9e1184c58\"" Dec 13 01:55:23.445790 systemd[1]: run-containerd-runc-k8s.io-ecf3fac08fac08b4dc95c2162ad0fa598a10f6022535d09fa14415a9e1184c58-runc.Iv6Fzz.mount: Deactivated successfully. Dec 13 01:55:23.481718 env[1551]: time="2024-12-13T01:55:23.481675241Z" level=info msg="StartContainer for \"ecf3fac08fac08b4dc95c2162ad0fa598a10f6022535d09fa14415a9e1184c58\" returns successfully" Dec 13 01:55:23.483352 env[1551]: time="2024-12-13T01:55:23.483311955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:55:23.695480 systemd-networkd[1703]: calib383a1b0c45: Gained IPv6LL Dec 13 01:55:24.357162 kubelet[2117]: E1213 01:55:24.357104 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:25.357622 kubelet[2117]: E1213 01:55:25.357554 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:26.358539 kubelet[2117]: E1213 01:55:26.358491 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:27.064213 env[1551]: time="2024-12-13T01:55:27.064156835Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:27.070566 env[1551]: time="2024-12-13T01:55:27.070501485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:27.074937 env[1551]: time="2024-12-13T01:55:27.074886419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:27.078070 env[1551]: time="2024-12-13T01:55:27.078031344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:27.078714 env[1551]: time="2024-12-13T01:55:27.078681349Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:55:27.081016 env[1551]: time="2024-12-13T01:55:27.080985368Z" level=info msg="CreateContainer within sandbox \"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:55:27.126091 env[1551]: time="2024-12-13T01:55:27.126043624Z" level=info msg="CreateContainer within sandbox \"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d8439327641b74a6f5d93d227c66f0f451ff356fe5040144c2daee455e49a618\"" Dec 13 01:55:27.126654 env[1551]: time="2024-12-13T01:55:27.126621729Z" level=info msg="StartContainer for \"d8439327641b74a6f5d93d227c66f0f451ff356fe5040144c2daee455e49a618\"" Dec 13 01:55:27.189347 env[1551]: time="2024-12-13T01:55:27.189308924Z" level=info msg="StartContainer for \"d8439327641b74a6f5d93d227c66f0f451ff356fe5040144c2daee455e49a618\" returns successfully" Dec 13 01:55:27.359550 kubelet[2117]: E1213 01:55:27.359397 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:27.452914 kubelet[2117]: I1213 01:55:27.452886 2117 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:55:27.452914 kubelet[2117]: I1213 01:55:27.452919 2117 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:55:27.551002 kubelet[2117]: I1213 01:55:27.550951 2117 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-b8h4x" podStartSLOduration=30.261958454 podStartE2EDuration="35.550904984s" podCreationTimestamp="2024-12-13 01:54:52 +0000 UTC" firstStartedPulling="2024-12-13 01:55:21.790075522 +0000 UTC m=+30.534679093" lastFinishedPulling="2024-12-13 01:55:27.079021952 +0000 UTC m=+35.823625623" observedRunningTime="2024-12-13 01:55:27.550829083 +0000 UTC m=+36.295432754" watchObservedRunningTime="2024-12-13 01:55:27.550904984 +0000 UTC m=+36.295508655" Dec 13 01:55:28.360380 kubelet[2117]: E1213 01:55:28.360317 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:29.360782 kubelet[2117]: E1213 01:55:29.360718 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:30.361749 kubelet[2117]: E1213 01:55:30.361687 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:30.443872 env[1551]: time="2024-12-13T01:55:30.443804786Z" level=info msg="StopPodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\"" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.484 [INFO][3131] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.484 [INFO][3131] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" iface="eth0" netns="/var/run/netns/cni-021ec445-7933-28ef-f62a-88e3e049075e" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.484 [INFO][3131] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" iface="eth0" netns="/var/run/netns/cni-021ec445-7933-28ef-f62a-88e3e049075e" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.485 [INFO][3131] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" iface="eth0" netns="/var/run/netns/cni-021ec445-7933-28ef-f62a-88e3e049075e" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.485 [INFO][3131] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.485 [INFO][3131] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.503 [INFO][3137] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.503 [INFO][3137] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.503 [INFO][3137] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.509 [WARNING][3137] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.509 [INFO][3137] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.511 [INFO][3137] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:30.513093 env[1551]: 2024-12-13 01:55:30.512 [INFO][3131] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:30.517175 env[1551]: time="2024-12-13T01:55:30.517125327Z" level=info msg="TearDown network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" successfully" Dec 13 01:55:30.517303 env[1551]: time="2024-12-13T01:55:30.517283529Z" level=info msg="StopPodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" returns successfully" Dec 13 01:55:30.517666 systemd[1]: run-netns-cni\x2d021ec445\x2d7933\x2d28ef\x2df62a\x2d88e3e049075e.mount: Deactivated successfully. Dec 13 01:55:30.518447 env[1551]: time="2024-12-13T01:55:30.518417537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2dbg2,Uid:6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6,Namespace:default,Attempt:1,}" Dec 13 01:55:30.678935 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:55:30.679095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9c85153804f: link becomes ready Dec 13 01:55:30.669471 systemd-networkd[1703]: cali9c85153804f: Link UP Dec 13 01:55:30.680284 systemd-networkd[1703]: cali9c85153804f: Gained carrier Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.599 [INFO][3143] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0 nginx-deployment-6d5f899847- default 6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6 1299 0 2024-12-13 01:55:15 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 nginx-deployment-6d5f899847-2dbg2 eth0 default [] [] [kns.default ksa.default.default] cali9c85153804f [] []}} ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.599 [INFO][3143] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.629 [INFO][3155] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" HandleID="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.642 [INFO][3155] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" HandleID="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031aab0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"nginx-deployment-6d5f899847-2dbg2", "timestamp":"2024-12-13 01:55:30.629291655 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.642 [INFO][3155] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.642 [INFO][3155] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.642 [INFO][3155] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.644 [INFO][3155] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.647 [INFO][3155] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.650 [INFO][3155] ipam/ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.651 [INFO][3155] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.653 [INFO][3155] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.654 [INFO][3155] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.655 [INFO][3155] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.659 [INFO][3155] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.665 [INFO][3155] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.194/26] block=192.168.17.192/26 handle="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.665 [INFO][3155] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.194/26] handle="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" host="10.200.8.13" Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.665 [INFO][3155] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:30.694523 env[1551]: 2024-12-13 01:55:30.665 [INFO][3155] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.194/26] IPv6=[] ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" HandleID="k8s-pod-network.d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.698870 env[1551]: 2024-12-13 01:55:30.667 [INFO][3143] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6", ResourceVersion:"1299", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"nginx-deployment-6d5f899847-2dbg2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c85153804f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:30.698870 env[1551]: 2024-12-13 01:55:30.667 [INFO][3143] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.194/32] ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.698870 env[1551]: 2024-12-13 01:55:30.667 [INFO][3143] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9c85153804f ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.698870 env[1551]: 2024-12-13 01:55:30.681 [INFO][3143] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.698870 env[1551]: 2024-12-13 01:55:30.681 [INFO][3143] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6", ResourceVersion:"1299", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc", Pod:"nginx-deployment-6d5f899847-2dbg2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c85153804f", MAC:"36:b5:1a:f5:0d:8f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:30.698870 env[1551]: 2024-12-13 01:55:30.689 [INFO][3143] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc" Namespace="default" Pod="nginx-deployment-6d5f899847-2dbg2" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:30.703000 audit[3175]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:30.708879 kernel: kauditd_printk_skb: 516 callbacks suppressed Dec 13 01:55:30.708953 kernel: audit: type=1325 audit(1734054930.703:357): table=filter:73 family=2 entries=38 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:30.716648 env[1551]: time="2024-12-13T01:55:30.716576999Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:30.716878 env[1551]: time="2024-12-13T01:55:30.716821801Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:30.717040 env[1551]: time="2024-12-13T01:55:30.717017302Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:30.717671 env[1551]: time="2024-12-13T01:55:30.717629207Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc pid=3187 runtime=io.containerd.runc.v2 Dec 13 01:55:30.725001 kernel: audit: type=1300 audit(1734054930.703:357): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe9835ddc0 a2=0 a3=7ffe9835ddac items=0 ppid=2755 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.703000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe9835ddc0 a2=0 a3=7ffe9835ddac items=0 ppid=2755 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:30.703000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:30.757053 kernel: audit: type=1327 audit(1734054930.703:357): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:30.790737 env[1551]: time="2024-12-13T01:55:30.790015441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-2dbg2,Uid:6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6,Namespace:default,Attempt:1,} returns sandbox id \"d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc\"" Dec 13 01:55:30.791840 env[1551]: time="2024-12-13T01:55:30.791801754Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 01:55:31.362635 kubelet[2117]: E1213 01:55:31.362581 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:31.701348 systemd[1]: run-containerd-runc-k8s.io-9e01db4fcd2b9a58499700beb251d02ddc138da6c19af011c11aeb00a6311344-runc.Sui1tH.mount: Deactivated successfully. Dec 13 01:55:32.329989 kubelet[2117]: E1213 01:55:32.329934 2117 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:32.363141 kubelet[2117]: E1213 01:55:32.363102 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:32.527244 systemd-networkd[1703]: cali9c85153804f: Gained IPv6LL Dec 13 01:55:33.363753 kubelet[2117]: E1213 01:55:33.363712 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:33.723559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3986544632.mount: Deactivated successfully. Dec 13 01:55:34.364807 kubelet[2117]: E1213 01:55:34.364758 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:35.364928 kubelet[2117]: E1213 01:55:35.364880 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:36.365092 kubelet[2117]: E1213 01:55:36.365042 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:36.709123 env[1551]: time="2024-12-13T01:55:36.708705476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.715367 env[1551]: time="2024-12-13T01:55:36.715324218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.719385 env[1551]: time="2024-12-13T01:55:36.719351744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.724490 env[1551]: time="2024-12-13T01:55:36.724449877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:36.725167 env[1551]: time="2024-12-13T01:55:36.725133682Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 01:55:36.727648 env[1551]: time="2024-12-13T01:55:36.727618298Z" level=info msg="CreateContainer within sandbox \"d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 01:55:36.761509 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount115409074.mount: Deactivated successfully. Dec 13 01:55:36.773296 env[1551]: time="2024-12-13T01:55:36.773239293Z" level=info msg="CreateContainer within sandbox \"d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"74c2935fdf1b8f18fad59b5a92e888157551e6d72eaebf0aba2f86fc9808a588\"" Dec 13 01:55:36.773881 env[1551]: time="2024-12-13T01:55:36.773842896Z" level=info msg="StartContainer for \"74c2935fdf1b8f18fad59b5a92e888157551e6d72eaebf0aba2f86fc9808a588\"" Dec 13 01:55:36.832403 env[1551]: time="2024-12-13T01:55:36.832352774Z" level=info msg="StartContainer for \"74c2935fdf1b8f18fad59b5a92e888157551e6d72eaebf0aba2f86fc9808a588\" returns successfully" Dec 13 01:55:37.365481 kubelet[2117]: E1213 01:55:37.365423 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:37.569684 kubelet[2117]: I1213 01:55:37.569640 2117 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-2dbg2" podStartSLOduration=16.635424125 podStartE2EDuration="22.569605259s" podCreationTimestamp="2024-12-13 01:55:15 +0000 UTC" firstStartedPulling="2024-12-13 01:55:30.79125845 +0000 UTC m=+39.535862121" lastFinishedPulling="2024-12-13 01:55:36.725439584 +0000 UTC m=+45.470043255" observedRunningTime="2024-12-13 01:55:37.569579359 +0000 UTC m=+46.314182930" watchObservedRunningTime="2024-12-13 01:55:37.569605259 +0000 UTC m=+46.314209030" Dec 13 01:55:38.365915 kubelet[2117]: E1213 01:55:38.365842 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:39.366460 kubelet[2117]: E1213 01:55:39.366396 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:40.366859 kubelet[2117]: E1213 01:55:40.366797 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:41.367396 kubelet[2117]: E1213 01:55:41.367333 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:42.368237 kubelet[2117]: E1213 01:55:42.368171 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:43.368834 kubelet[2117]: E1213 01:55:43.368769 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:44.369385 kubelet[2117]: E1213 01:55:44.369327 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:45.369722 kubelet[2117]: E1213 01:55:45.369661 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:45.587000 audit[3317]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.587000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe1d9b7e70 a2=0 a3=7ffe1d9b7e5c items=0 ppid=2329 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.618255 kernel: audit: type=1325 audit(1734054945.587:358): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.618374 kernel: audit: type=1300 audit(1734054945.587:358): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe1d9b7e70 a2=0 a3=7ffe1d9b7e5c items=0 ppid=2329 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.618402 kernel: audit: type=1327 audit(1734054945.587:358): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.627000 audit[3317]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.635755 kubelet[2117]: I1213 01:55:45.635721 2117 topology_manager.go:215] "Topology Admit Handler" podUID="3c496f4f-ea3d-4929-802d-d3da69ec752e" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 01:55:45.627000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe1d9b7e70 a2=0 a3=0 items=0 ppid=2329 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.657950 kernel: audit: type=1325 audit(1734054945.627:359): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.658122 kernel: audit: type=1300 audit(1734054945.627:359): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe1d9b7e70 a2=0 a3=0 items=0 ppid=2329 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.667986 kernel: audit: type=1327 audit(1734054945.627:359): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.673000 audit[3321]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.673000 audit[3321]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe46a5c900 a2=0 a3=7ffe46a5c8ec items=0 ppid=2329 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.702592 kernel: audit: type=1325 audit(1734054945.673:360): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.702699 kernel: audit: type=1300 audit(1734054945.673:360): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe46a5c900 a2=0 a3=7ffe46a5c8ec items=0 ppid=2329 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.702724 kernel: audit: type=1327 audit(1734054945.673:360): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.702000 audit[3321]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.719159 kubelet[2117]: I1213 01:55:45.719016 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vj7f5\" (UniqueName: \"kubernetes.io/projected/3c496f4f-ea3d-4929-802d-d3da69ec752e-kube-api-access-vj7f5\") pod \"nfs-server-provisioner-0\" (UID: \"3c496f4f-ea3d-4929-802d-d3da69ec752e\") " pod="default/nfs-server-provisioner-0" Dec 13 01:55:45.719159 kubelet[2117]: I1213 01:55:45.719072 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/3c496f4f-ea3d-4929-802d-d3da69ec752e-data\") pod \"nfs-server-provisioner-0\" (UID: \"3c496f4f-ea3d-4929-802d-d3da69ec752e\") " pod="default/nfs-server-provisioner-0" Dec 13 01:55:45.721398 kernel: audit: type=1325 audit(1734054945.702:361): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:45.702000 audit[3321]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe46a5c900 a2=0 a3=0 items=0 ppid=2329 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:45.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:45.943030 env[1551]: time="2024-12-13T01:55:45.942325309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3c496f4f-ea3d-4929-802d-d3da69ec752e,Namespace:default,Attempt:0,}" Dec 13 01:55:46.088498 systemd-networkd[1703]: cali60e51b789ff: Link UP Dec 13 01:55:46.094466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:55:46.094721 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 01:55:46.094908 systemd-networkd[1703]: cali60e51b789ff: Gained carrier Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.017 [INFO][3323] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 3c496f4f-ea3d-4929-802d-d3da69ec752e 1366 0 2024-12-13 01:55:45 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.017 [INFO][3323] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.044 [INFO][3336] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" HandleID="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.054 [INFO][3336] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" HandleID="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031aad0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 01:55:46.044864855 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.054 [INFO][3336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.055 [INFO][3336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.055 [INFO][3336] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.056 [INFO][3336] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.060 [INFO][3336] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.064 [INFO][3336] ipam/ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.065 [INFO][3336] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.067 [INFO][3336] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.067 [INFO][3336] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.069 [INFO][3336] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5 Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.072 [INFO][3336] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.080 [INFO][3336] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.195/26] block=192.168.17.192/26 handle="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.080 [INFO][3336] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.195/26] handle="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" host="10.200.8.13" Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.080 [INFO][3336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:46.123396 env[1551]: 2024-12-13 01:55:46.080 [INFO][3336] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.195/26] IPv6=[] ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" HandleID="k8s-pod-network.719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.124374 env[1551]: 2024-12-13 01:55:46.082 [INFO][3323] cni-plugin/k8s.go 386: Populated endpoint ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3c496f4f-ea3d-4929-802d-d3da69ec752e", ResourceVersion:"1366", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.17.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:46.124374 env[1551]: 2024-12-13 01:55:46.082 [INFO][3323] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.195/32] ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.124374 env[1551]: 2024-12-13 01:55:46.082 [INFO][3323] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.124374 env[1551]: 2024-12-13 01:55:46.095 [INFO][3323] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.124671 env[1551]: 2024-12-13 01:55:46.096 [INFO][3323] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3c496f4f-ea3d-4929-802d-d3da69ec752e", ResourceVersion:"1366", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.17.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"fe:72:f9:08:49:d2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:46.124671 env[1551]: 2024-12-13 01:55:46.108 [INFO][3323] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Dec 13 01:55:46.127000 audit[3352]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3352 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:55:46.127000 audit[3352]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffeb7120960 a2=0 a3=7ffeb712094c items=0 ppid=2755 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:46.127000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:55:46.370133 kubelet[2117]: E1213 01:55:46.370087 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:47.236210 env[1551]: time="2024-12-13T01:55:47.236143007Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:55:47.236726 env[1551]: time="2024-12-13T01:55:47.236179907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:55:47.236726 env[1551]: time="2024-12-13T01:55:47.236193507Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:55:47.236726 env[1551]: time="2024-12-13T01:55:47.236341808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5 pid=3366 runtime=io.containerd.runc.v2 Dec 13 01:55:47.260146 systemd[1]: run-containerd-runc-k8s.io-719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5-runc.tTIMUp.mount: Deactivated successfully. Dec 13 01:55:47.302565 env[1551]: time="2024-12-13T01:55:47.301922247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3c496f4f-ea3d-4929-802d-d3da69ec752e,Namespace:default,Attempt:0,} returns sandbox id \"719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5\"" Dec 13 01:55:47.303855 env[1551]: time="2024-12-13T01:55:47.303820057Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 01:55:47.370893 kubelet[2117]: E1213 01:55:47.370825 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:48.143159 systemd-networkd[1703]: cali60e51b789ff: Gained IPv6LL Dec 13 01:55:48.371062 kubelet[2117]: E1213 01:55:48.371012 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:49.371539 kubelet[2117]: E1213 01:55:49.371475 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:50.060122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4172593299.mount: Deactivated successfully. Dec 13 01:55:50.372937 kubelet[2117]: E1213 01:55:50.372512 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:51.373391 kubelet[2117]: E1213 01:55:51.373344 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:52.329946 kubelet[2117]: E1213 01:55:52.329888 2117 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:52.357574 env[1551]: time="2024-12-13T01:55:52.357527374Z" level=info msg="StopPodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\"" Dec 13 01:55:52.374343 kubelet[2117]: E1213 01:55:52.374300 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.393 [WARNING][3415] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6", ResourceVersion:"1328", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc", Pod:"nginx-deployment-6d5f899847-2dbg2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c85153804f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.393 [INFO][3415] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.393 [INFO][3415] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" iface="eth0" netns="" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.393 [INFO][3415] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.393 [INFO][3415] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.417 [INFO][3421] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.417 [INFO][3421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.417 [INFO][3421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.425 [WARNING][3421] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.425 [INFO][3421] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.429 [INFO][3421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:52.430795 env[1551]: 2024-12-13 01:55:52.429 [INFO][3415] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.431414 env[1551]: time="2024-12-13T01:55:52.431042021Z" level=info msg="TearDown network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" successfully" Dec 13 01:55:52.431414 env[1551]: time="2024-12-13T01:55:52.431120921Z" level=info msg="StopPodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" returns successfully" Dec 13 01:55:52.431779 env[1551]: time="2024-12-13T01:55:52.431742124Z" level=info msg="RemovePodSandbox for \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\"" Dec 13 01:55:52.431896 env[1551]: time="2024-12-13T01:55:52.431785324Z" level=info msg="Forcibly stopping sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\"" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.470 [WARNING][3439] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"6b58a009-aa1b-4b08-b3e3-0e3d8999a2c6", ResourceVersion:"1328", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"d2d85a08754de04d8b1dede607cc29ace90a0ade79e6110404a33c6219eaabbc", Pod:"nginx-deployment-6d5f899847-2dbg2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c85153804f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.470 [INFO][3439] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.470 [INFO][3439] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" iface="eth0" netns="" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.470 [INFO][3439] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.470 [INFO][3439] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.490 [INFO][3447] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.490 [INFO][3447] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.490 [INFO][3447] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.518 [WARNING][3447] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.518 [INFO][3447] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" HandleID="k8s-pod-network.00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--2dbg2-eth0" Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.520 [INFO][3447] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:52.522200 env[1551]: 2024-12-13 01:55:52.521 [INFO][3439] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6" Dec 13 01:55:52.522847 env[1551]: time="2024-12-13T01:55:52.522234751Z" level=info msg="TearDown network for sandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" successfully" Dec 13 01:55:53.333489 env[1551]: time="2024-12-13T01:55:53.333428848Z" level=info msg="RemovePodSandbox \"00648a615e41d9fb434c46051aaea31518a3661ee4870e0cf8df316a978d9ed6\" returns successfully" Dec 13 01:55:53.334313 env[1551]: time="2024-12-13T01:55:53.334278652Z" level=info msg="StopPodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\"" Dec 13 01:55:53.374797 kubelet[2117]: E1213 01:55:53.374752 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.401 [WARNING][3466] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--b8h4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b8bfbd61-8e15-4058-a6ad-858fe1555dcb", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68", Pod:"csi-node-driver-b8h4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib383a1b0c45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.402 [INFO][3466] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.402 [INFO][3466] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" iface="eth0" netns="" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.402 [INFO][3466] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.402 [INFO][3466] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.420 [INFO][3473] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.420 [INFO][3473] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.420 [INFO][3473] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.428 [WARNING][3473] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.428 [INFO][3473] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.436 [INFO][3473] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:53.442840 env[1551]: 2024-12-13 01:55:53.438 [INFO][3466] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.443810 env[1551]: time="2024-12-13T01:55:53.442874155Z" level=info msg="TearDown network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" successfully" Dec 13 01:55:53.443810 env[1551]: time="2024-12-13T01:55:53.442911455Z" level=info msg="StopPodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" returns successfully" Dec 13 01:55:53.443810 env[1551]: time="2024-12-13T01:55:53.443489657Z" level=info msg="RemovePodSandbox for \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\"" Dec 13 01:55:53.443810 env[1551]: time="2024-12-13T01:55:53.443528258Z" level=info msg="Forcibly stopping sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\"" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.478 [WARNING][3491] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--b8h4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b8bfbd61-8e15-4058-a6ad-858fe1555dcb", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 54, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"e5e72b74a09ff22b65052ab5c6d4cc43b5d8764289bd2e94087055af993c2a68", Pod:"csi-node-driver-b8h4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib383a1b0c45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.478 [INFO][3491] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.478 [INFO][3491] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" iface="eth0" netns="" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.478 [INFO][3491] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.478 [INFO][3491] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.496 [INFO][3497] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.496 [INFO][3497] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.496 [INFO][3497] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.503 [WARNING][3497] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.503 [INFO][3497] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" HandleID="k8s-pod-network.289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Workload="10.200.8.13-k8s-csi--node--driver--b8h4x-eth0" Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.504 [INFO][3497] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:55:53.506465 env[1551]: 2024-12-13 01:55:53.505 [INFO][3491] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935" Dec 13 01:55:53.507205 env[1551]: time="2024-12-13T01:55:53.506509749Z" level=info msg="TearDown network for sandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" successfully" Dec 13 01:55:53.685439 env[1551]: time="2024-12-13T01:55:53.685275777Z" level=info msg="RemovePodSandbox \"289f9266fdd0d59798b2e64cacc2d6aee63271283ff90a518307bf1186f5d935\" returns successfully" Dec 13 01:55:54.050292 env[1551]: time="2024-12-13T01:55:54.050241264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:54.062544 env[1551]: time="2024-12-13T01:55:54.062502219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:54.067325 env[1551]: time="2024-12-13T01:55:54.067280041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:54.072722 env[1551]: time="2024-12-13T01:55:54.072680966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:55:54.073403 env[1551]: time="2024-12-13T01:55:54.073368569Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 01:55:54.075702 env[1551]: time="2024-12-13T01:55:54.075669179Z" level=info msg="CreateContainer within sandbox \"719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 01:55:54.114405 env[1551]: time="2024-12-13T01:55:54.114354055Z" level=info msg="CreateContainer within sandbox \"719313ae9d6a244b8f32d6d47e31620d4109c19061c4057e389ff2f8f3fd35d5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8a48774f5089a4ce769131d729756d114cd3c9979639705c698b4136d57bb088\"" Dec 13 01:55:54.115010 env[1551]: time="2024-12-13T01:55:54.114962558Z" level=info msg="StartContainer for \"8a48774f5089a4ce769131d729756d114cd3c9979639705c698b4136d57bb088\"" Dec 13 01:55:54.169135 env[1551]: time="2024-12-13T01:55:54.169088705Z" level=info msg="StartContainer for \"8a48774f5089a4ce769131d729756d114cd3c9979639705c698b4136d57bb088\" returns successfully" Dec 13 01:55:54.375119 kubelet[2117]: E1213 01:55:54.374933 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:54.610132 kubelet[2117]: I1213 01:55:54.610096 2117 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.839601996 podStartE2EDuration="9.610060412s" podCreationTimestamp="2024-12-13 01:55:45 +0000 UTC" firstStartedPulling="2024-12-13 01:55:47.303245754 +0000 UTC m=+56.047849425" lastFinishedPulling="2024-12-13 01:55:54.07370417 +0000 UTC m=+62.818307841" observedRunningTime="2024-12-13 01:55:54.609472809 +0000 UTC m=+63.354076480" watchObservedRunningTime="2024-12-13 01:55:54.610060412 +0000 UTC m=+63.354663983" Dec 13 01:55:54.623000 audit[3550]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:54.627960 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 01:55:54.628118 kernel: audit: type=1325 audit(1734054954.623:363): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:54.623000 audit[3550]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb3f60580 a2=0 a3=7ffdb3f6056c items=0 ppid=2329 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:54.656075 kernel: audit: type=1300 audit(1734054954.623:363): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb3f60580 a2=0 a3=7ffdb3f6056c items=0 ppid=2329 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:54.656203 kernel: audit: type=1327 audit(1734054954.623:363): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:54.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:54.658000 audit[3550]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:54.675200 kernel: audit: type=1325 audit(1734054954.658:364): table=nat:80 family=2 entries=106 op=nft_register_chain pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:55:54.675296 kernel: audit: type=1300 audit(1734054954.658:364): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb3f60580 a2=0 a3=7ffdb3f6056c items=0 ppid=2329 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:54.658000 audit[3550]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb3f60580 a2=0 a3=7ffdb3f6056c items=0 ppid=2329 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:55:54.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:54.703992 kernel: audit: type=1327 audit(1734054954.658:364): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:55:55.375683 kubelet[2117]: E1213 01:55:55.375636 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:56.376500 kubelet[2117]: E1213 01:55:56.376438 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:57.377482 kubelet[2117]: E1213 01:55:57.377409 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:58.378236 kubelet[2117]: E1213 01:55:58.378170 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:55:59.378673 kubelet[2117]: E1213 01:55:59.378627 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:00.379122 kubelet[2117]: E1213 01:56:00.379064 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:01.379666 kubelet[2117]: E1213 01:56:01.379608 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:01.699359 systemd[1]: run-containerd-runc-k8s.io-9e01db4fcd2b9a58499700beb251d02ddc138da6c19af011c11aeb00a6311344-runc.2tWOLV.mount: Deactivated successfully. Dec 13 01:56:02.380812 kubelet[2117]: E1213 01:56:02.380753 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:03.381102 kubelet[2117]: E1213 01:56:03.381046 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:04.381876 kubelet[2117]: E1213 01:56:04.381811 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:05.382395 kubelet[2117]: E1213 01:56:05.382331 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:06.382923 kubelet[2117]: E1213 01:56:06.382858 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:07.383511 kubelet[2117]: E1213 01:56:07.383453 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:08.384644 kubelet[2117]: E1213 01:56:08.384579 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:09.385075 kubelet[2117]: E1213 01:56:09.384933 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:10.385550 kubelet[2117]: E1213 01:56:10.385498 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:11.386256 kubelet[2117]: E1213 01:56:11.386162 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:12.329710 kubelet[2117]: E1213 01:56:12.329656 2117 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:12.387412 kubelet[2117]: E1213 01:56:12.387354 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:13.388143 kubelet[2117]: E1213 01:56:13.388084 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:14.388476 kubelet[2117]: E1213 01:56:14.388439 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:15.389024 kubelet[2117]: E1213 01:56:15.388962 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:16.389723 kubelet[2117]: E1213 01:56:16.389631 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:17.390652 kubelet[2117]: E1213 01:56:17.390556 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:18.391238 kubelet[2117]: E1213 01:56:18.391183 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:18.903388 kubelet[2117]: I1213 01:56:18.903338 2117 topology_manager.go:215] "Topology Admit Handler" podUID="ed254c66-2486-4c05-9f25-bb0ee2416a7c" podNamespace="default" podName="test-pod-1" Dec 13 01:56:19.015948 kubelet[2117]: I1213 01:56:19.015899 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-6d9db9a8-d461-45cd-a1fb-5f880ee70b67\" (UniqueName: \"kubernetes.io/nfs/ed254c66-2486-4c05-9f25-bb0ee2416a7c-pvc-6d9db9a8-d461-45cd-a1fb-5f880ee70b67\") pod \"test-pod-1\" (UID: \"ed254c66-2486-4c05-9f25-bb0ee2416a7c\") " pod="default/test-pod-1" Dec 13 01:56:19.016193 kubelet[2117]: I1213 01:56:19.016004 2117 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x9fxm\" (UniqueName: \"kubernetes.io/projected/ed254c66-2486-4c05-9f25-bb0ee2416a7c-kube-api-access-x9fxm\") pod \"test-pod-1\" (UID: \"ed254c66-2486-4c05-9f25-bb0ee2416a7c\") " pod="default/test-pod-1" Dec 13 01:56:19.220000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.246690 kernel: Failed to create system directory netfs Dec 13 01:56:19.246801 kernel: audit: type=1400 audit(1734054979.220:365): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.246832 kernel: Failed to create system directory netfs Dec 13 01:56:19.246859 kernel: audit: type=1400 audit(1734054979.220:365): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.220000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.266274 kernel: Failed to create system directory netfs Dec 13 01:56:19.266372 kernel: audit: type=1400 audit(1734054979.220:365): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.220000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.285487 kernel: Failed to create system directory netfs Dec 13 01:56:19.285602 kernel: audit: type=1400 audit(1734054979.220:365): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.220000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.220000 audit[3602]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555af100a5e0 a1=153bc a2=555aed3e82b0 a3=5 items=0 ppid=1273 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:19.220000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:56:19.326622 kernel: audit: type=1300 audit(1734054979.220:365): arch=c000003e syscall=175 success=yes exit=0 a0=555af100a5e0 a1=153bc a2=555aed3e82b0 a3=5 items=0 ppid=1273 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:19.326739 kernel: audit: type=1327 audit(1734054979.220:365): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.358367 kernel: Failed to create system directory fscache Dec 13 01:56:19.358485 kernel: audit: type=1400 audit(1734054979.331:366): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.358519 kernel: Failed to create system directory fscache Dec 13 01:56:19.358540 kernel: audit: type=1400 audit(1734054979.331:366): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.377295 kernel: Failed to create system directory fscache Dec 13 01:56:19.377404 kernel: audit: type=1400 audit(1734054979.331:366): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.395855 kernel: Failed to create system directory fscache Dec 13 01:56:19.395995 kernel: audit: type=1400 audit(1734054979.331:366): avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.396312 kubelet[2117]: E1213 01:56:19.396276 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.410992 kernel: Failed to create system directory fscache Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.417498 kernel: Failed to create system directory fscache Dec 13 01:56:19.417578 kernel: Failed to create system directory fscache Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.427854 kernel: Failed to create system directory fscache Dec 13 01:56:19.427929 kernel: Failed to create system directory fscache Dec 13 01:56:19.427951 kernel: Failed to create system directory fscache Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.434414 kernel: Failed to create system directory fscache Dec 13 01:56:19.434490 kernel: Failed to create system directory fscache Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.440787 kernel: Failed to create system directory fscache Dec 13 01:56:19.440856 kernel: Failed to create system directory fscache Dec 13 01:56:19.331000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.331000 audit[3602]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555af121f9c0 a1=4c0fc a2=555aed3e82b0 a3=5 items=0 ppid=1273 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:19.331000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:56:19.447992 kernel: FS-Cache: Loaded Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.571134 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.571236 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.571256 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.577460 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.577546 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.583794 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.583868 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.589726 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.589789 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.595574 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.595634 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.601503 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.601564 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.607280 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.607371 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.613700 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.613761 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.617216 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.622024 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.622076 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.627496 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.627559 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.633283 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.633341 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.638588 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.638694 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.643846 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.643910 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.649247 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.649309 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.654658 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.654715 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.659779 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.659842 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.664923 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.664990 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.669835 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.672983 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.673030 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.677562 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.677611 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.682592 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.682658 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.689914 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.689985 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.690012 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.695106 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.695166 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.700223 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.700265 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.705162 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.705213 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.710148 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.710198 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.714951 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.715005 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.720073 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.720131 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.725242 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.725293 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.730089 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.730140 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.734936 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.734990 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.739890 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.739938 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.744703 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.744753 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.749685 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.749735 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.754514 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.754567 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.757986 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.759985 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.766868 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.766921 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.766942 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.769379 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.774759 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.775500 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.779983 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.780034 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.784955 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.785017 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.790158 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.790211 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.795203 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.795251 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.800216 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.800267 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.805360 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.805411 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.810486 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.810538 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.815496 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.815537 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.820992 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.821049 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.825400 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.826119 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.830634 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.830685 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.835666 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.835715 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.840850 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.840901 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.845806 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.845852 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.850988 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.851040 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.855908 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.855963 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.860989 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.861041 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.866369 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.866421 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.871453 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.871505 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.876344 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.876389 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.881573 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.882289 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.886774 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.886825 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.889990 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.550000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:19.894434 kernel: Failed to create system directory sunrpc Dec 13 01:56:19.907193 kernel: RPC: Registered named UNIX socket transport module. Dec 13 01:56:19.907281 kernel: RPC: Registered udp transport module. Dec 13 01:56:19.907308 kernel: RPC: Registered tcp transport module. Dec 13 01:56:19.909478 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 01:56:19.550000 audit[3602]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555af126bad0 a1=1a7f1c a2=555aed3e82b0 a3=5 items=6 ppid=1273 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:19.550000 audit: CWD cwd="/" Dec 13 01:56:19.550000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:19.550000 audit: PATH item=1 name=(null) inode=27843 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:19.550000 audit: PATH item=2 name=(null) inode=27843 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:19.550000 audit: PATH item=3 name=(null) inode=27844 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:19.550000 audit: PATH item=4 name=(null) inode=27843 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:19.550000 audit: PATH item=5 name=(null) inode=27845 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:56:19.550000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.092064 kernel: Failed to create system directory nfs Dec 13 01:56:20.092134 kernel: Failed to create system directory nfs Dec 13 01:56:20.092159 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.097080 kernel: Failed to create system directory nfs Dec 13 01:56:20.097145 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.102518 kernel: Failed to create system directory nfs Dec 13 01:56:20.102586 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.107164 kernel: Failed to create system directory nfs Dec 13 01:56:20.107233 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.112043 kernel: Failed to create system directory nfs Dec 13 01:56:20.112097 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.116835 kernel: Failed to create system directory nfs Dec 13 01:56:20.116880 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.122015 kernel: Failed to create system directory nfs Dec 13 01:56:20.122076 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.126636 kernel: Failed to create system directory nfs Dec 13 01:56:20.126687 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.131736 kernel: Failed to create system directory nfs Dec 13 01:56:20.131778 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.136611 kernel: Failed to create system directory nfs Dec 13 01:56:20.136660 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.141352 kernel: Failed to create system directory nfs Dec 13 01:56:20.141403 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.144400 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.148506 kernel: Failed to create system directory nfs Dec 13 01:56:20.148548 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.153411 kernel: Failed to create system directory nfs Dec 13 01:56:20.153465 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.158011 kernel: Failed to create system directory nfs Dec 13 01:56:20.158062 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.162713 kernel: Failed to create system directory nfs Dec 13 01:56:20.162763 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.167588 kernel: Failed to create system directory nfs Dec 13 01:56:20.167641 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.172412 kernel: Failed to create system directory nfs Dec 13 01:56:20.172467 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.177350 kernel: Failed to create system directory nfs Dec 13 01:56:20.177403 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.182264 kernel: Failed to create system directory nfs Dec 13 01:56:20.182315 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.187115 kernel: Failed to create system directory nfs Dec 13 01:56:20.187165 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.191868 kernel: Failed to create system directory nfs Dec 13 01:56:20.191924 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.196788 kernel: Failed to create system directory nfs Dec 13 01:56:20.197477 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.200026 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.203990 kernel: Failed to create system directory nfs Dec 13 01:56:20.204037 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.208752 kernel: Failed to create system directory nfs Dec 13 01:56:20.208801 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.213550 kernel: Failed to create system directory nfs Dec 13 01:56:20.213598 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.218345 kernel: Failed to create system directory nfs Dec 13 01:56:20.218395 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.223024 kernel: Failed to create system directory nfs Dec 13 01:56:20.223072 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.227870 kernel: Failed to create system directory nfs Dec 13 01:56:20.227930 kernel: Failed to create system directory nfs Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.076000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.232680 kernel: Failed to create system directory nfs Dec 13 01:56:20.254022 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 01:56:20.076000 audit[3602]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555af148c700 a1=16e97c a2=555aed3e82b0 a3=5 items=0 ppid=1273 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:20.076000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.351521 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.351602 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.351627 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.356533 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.356599 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.361379 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.361438 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.366433 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.366499 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.371507 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.371577 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.376618 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.376678 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.381569 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.381618 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.386754 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.386827 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.391679 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.391737 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.396721 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.396761 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.397880 kubelet[2117]: E1213 01:56:20.397823 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.402250 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.402302 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.407157 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.407223 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.412380 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.412432 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.417239 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.417288 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.422778 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.422836 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.427301 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.427356 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.432063 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.432134 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.437108 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.437156 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.444743 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.444794 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.447526 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.447589 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.453294 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.453354 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.458194 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.458279 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.463264 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.463321 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.468232 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.468287 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.473148 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.473187 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.477838 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.477888 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.482813 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.482872 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.487790 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.487841 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.492413 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.492473 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.497349 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.497399 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.501923 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.507161 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.507215 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.507237 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.512331 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.512388 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.517242 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.517303 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.519709 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.522195 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.526894 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.526948 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.532167 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.532227 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.537183 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.537233 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.542287 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.542338 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.547733 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.547790 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.552916 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.552978 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.558565 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.558607 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.563669 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.563727 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.568565 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.568627 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.573566 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.573625 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.578699 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.578766 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.581029 kernel: Failed to create system directory nfs4 Dec 13 01:56:20.330000 audit[3607]: AVC avc: denied { confidentiality } for pid=3607 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.719285 kernel: NFS: Registering the id_resolver key type Dec 13 01:56:20.719412 kernel: Key type id_resolver registered Dec 13 01:56:20.719437 kernel: Key type id_legacy registered Dec 13 01:56:20.330000 audit[3607]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f98424af010 a1=208de4 a2=5639d30232b0 a3=5 items=0 ppid=1273 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:20.330000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.780948 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.781044 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.781077 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.784362 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.786908 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.789456 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.791946 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.796938 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.797003 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.802463 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.802503 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.807529 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.807581 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.812596 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.812642 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.817859 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.817910 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.823019 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.823063 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.828263 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.831416 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.831469 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.836389 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.836429 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.841364 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.841407 kernel: Failed to create system directory rpcgss Dec 13 01:56:20.770000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:56:20.770000 audit[3608]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f602e1d9010 a1=70af4 a2=55b565e112b0 a3=5 items=0 ppid=1273 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:20.770000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 01:56:21.398350 kubelet[2117]: E1213 01:56:21.398289 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:21.476774 nfsidmap[3616]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-e23a6f90f8' Dec 13 01:56:21.492503 nfsidmap[3617]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-e23a6f90f8' Dec 13 01:56:21.506000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:56:21.506000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:56:21.506000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:56:21.506000 audit[1657]: AVC avc: denied { watch_reads } for pid=1657 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:56:21.506000 audit[1657]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55daab0f7ac0 a2=10 a3=370883f62cc201d4 items=0 ppid=1 pid=1657 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:21.506000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:56:21.507000 audit[1657]: AVC avc: denied { watch_reads } for pid=1657 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:56:21.507000 audit[1657]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55daab0f7ac0 a2=10 a3=370883f62cc201d4 items=0 ppid=1 pid=1657 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:21.507000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:56:21.507000 audit[1657]: AVC avc: denied { watch_reads } for pid=1657 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 01:56:21.507000 audit[1657]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55daab0f7ac0 a2=10 a3=370883f62cc201d4 items=0 ppid=1 pid=1657 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:21.507000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 01:56:21.607381 env[1551]: time="2024-12-13T01:56:21.607329313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ed254c66-2486-4c05-9f25-bb0ee2416a7c,Namespace:default,Attempt:0,}" Dec 13 01:56:21.805368 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:56:21.805488 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 01:56:21.797632 systemd-networkd[1703]: cali5ec59c6bf6e: Link UP Dec 13 01:56:21.807278 systemd-networkd[1703]: cali5ec59c6bf6e: Gained carrier Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.724 [INFO][3619] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-test--pod--1-eth0 default ed254c66-2486-4c05-9f25-bb0ee2416a7c 1464 0 2024-12-13 01:55:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.724 [INFO][3619] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.749 [INFO][3631] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" HandleID="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Workload="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.760 [INFO][3631] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" HandleID="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Workload="10.200.8.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319940), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"test-pod-1", "timestamp":"2024-12-13 01:56:21.749291257 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.760 [INFO][3631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.760 [INFO][3631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.760 [INFO][3631] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.764 [INFO][3631] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.767 [INFO][3631] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.770 [INFO][3631] ipam/ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.772 [INFO][3631] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.774 [INFO][3631] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.774 [INFO][3631] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.775 [INFO][3631] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.779 [INFO][3631] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.786 [INFO][3631] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.196/26] block=192.168.17.192/26 handle="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.786 [INFO][3631] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.196/26] handle="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" host="10.200.8.13" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.786 [INFO][3631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.786 [INFO][3631] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.196/26] IPv6=[] ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" HandleID="k8s-pod-network.b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Workload="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.817013 env[1551]: 2024-12-13 01:56:21.788 [INFO][3619] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ed254c66-2486-4c05-9f25-bb0ee2416a7c", ResourceVersion:"1464", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:21.818333 env[1551]: 2024-12-13 01:56:21.788 [INFO][3619] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.196/32] ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.818333 env[1551]: 2024-12-13 01:56:21.788 [INFO][3619] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.818333 env[1551]: 2024-12-13 01:56:21.806 [INFO][3619] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.818333 env[1551]: 2024-12-13 01:56:21.808 [INFO][3619] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ed254c66-2486-4c05-9f25-bb0ee2416a7c", ResourceVersion:"1464", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 55, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"32:64:de:5f:25:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:56:21.818333 env[1551]: 2024-12-13 01:56:21.815 [INFO][3619] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Dec 13 01:56:21.830000 audit[3651]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3651 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:56:21.830000 audit[3651]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffcf4dbf000 a2=0 a3=7ffcf4dbefec items=0 ppid=2755 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:56:21.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:56:21.931672 env[1551]: time="2024-12-13T01:56:21.931595727Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:56:21.931672 env[1551]: time="2024-12-13T01:56:21.931635828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:56:21.931672 env[1551]: time="2024-12-13T01:56:21.931650428Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:56:21.938924 env[1551]: time="2024-12-13T01:56:21.932138629Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f pid=3660 runtime=io.containerd.runc.v2 Dec 13 01:56:21.991515 env[1551]: time="2024-12-13T01:56:21.991461415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ed254c66-2486-4c05-9f25-bb0ee2416a7c,Namespace:default,Attempt:0,} returns sandbox id \"b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f\"" Dec 13 01:56:21.993293 env[1551]: time="2024-12-13T01:56:21.993259620Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 01:56:22.398573 kubelet[2117]: E1213 01:56:22.398518 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:22.490776 env[1551]: time="2024-12-13T01:56:22.490724660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:22.499908 env[1551]: time="2024-12-13T01:56:22.499870688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:22.503133 env[1551]: time="2024-12-13T01:56:22.503096698Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:22.507120 env[1551]: time="2024-12-13T01:56:22.507088311Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:56:22.507753 env[1551]: time="2024-12-13T01:56:22.507716513Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 01:56:22.510243 env[1551]: time="2024-12-13T01:56:22.510213920Z" level=info msg="CreateContainer within sandbox \"b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 01:56:22.553188 env[1551]: time="2024-12-13T01:56:22.553140153Z" level=info msg="CreateContainer within sandbox \"b15aa0f1d797a4be336bac838c56cf88fec5a4ed36a511c02d276771e02cd10f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"5dbc8e655fa72cf65ff92bb60a52aa794d4436529b7d148fd5134e997b55a416\"" Dec 13 01:56:22.554128 env[1551]: time="2024-12-13T01:56:22.554092756Z" level=info msg="StartContainer for \"5dbc8e655fa72cf65ff92bb60a52aa794d4436529b7d148fd5134e997b55a416\"" Dec 13 01:56:22.614553 env[1551]: time="2024-12-13T01:56:22.614505943Z" level=info msg="StartContainer for \"5dbc8e655fa72cf65ff92bb60a52aa794d4436529b7d148fd5134e997b55a416\" returns successfully" Dec 13 01:56:22.667365 kubelet[2117]: I1213 01:56:22.667214 2117 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=36.152124811 podStartE2EDuration="36.667171306s" podCreationTimestamp="2024-12-13 01:55:46 +0000 UTC" firstStartedPulling="2024-12-13 01:56:21.992988219 +0000 UTC m=+90.737591890" lastFinishedPulling="2024-12-13 01:56:22.508034814 +0000 UTC m=+91.252638385" observedRunningTime="2024-12-13 01:56:22.666910005 +0000 UTC m=+91.411513676" watchObservedRunningTime="2024-12-13 01:56:22.667171306 +0000 UTC m=+91.411774977" Dec 13 01:56:23.279181 systemd-networkd[1703]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 01:56:23.399110 kubelet[2117]: E1213 01:56:23.399052 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:24.399200 kubelet[2117]: E1213 01:56:24.399144 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:25.399793 kubelet[2117]: E1213 01:56:25.399733 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:26.399953 kubelet[2117]: E1213 01:56:26.399911 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:27.400310 kubelet[2117]: E1213 01:56:27.400253 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:28.400615 kubelet[2117]: E1213 01:56:28.400558 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:29.400829 kubelet[2117]: E1213 01:56:29.400773 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 01:56:30.401129 kubelet[2117]: E1213 01:56:30.401068 2117 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"