Dec 13 03:26:49.568597 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 03:26:49.568610 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:26:49.568617 kernel: BIOS-provided physical RAM map: Dec 13 03:26:49.568621 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 03:26:49.568625 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 03:26:49.568629 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 03:26:49.568633 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 03:26:49.568637 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 03:26:49.568641 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000008266efff] usable Dec 13 03:26:49.568645 kernel: BIOS-e820: [mem 0x000000008266f000-0x000000008266ffff] ACPI NVS Dec 13 03:26:49.568649 kernel: BIOS-e820: [mem 0x0000000082670000-0x0000000082670fff] reserved Dec 13 03:26:49.568653 kernel: BIOS-e820: [mem 0x0000000082671000-0x000000008afccfff] usable Dec 13 03:26:49.568657 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 03:26:49.568661 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 03:26:49.568666 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 03:26:49.568671 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 03:26:49.568675 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 03:26:49.568679 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 03:26:49.568684 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 03:26:49.568688 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 03:26:49.568692 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 03:26:49.568696 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 03:26:49.568700 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 03:26:49.568704 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 03:26:49.568708 kernel: NX (Execute Disable) protection: active Dec 13 03:26:49.568713 kernel: SMBIOS 3.2.1 present. Dec 13 03:26:49.568718 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 03:26:49.568722 kernel: tsc: Detected 3400.000 MHz processor Dec 13 03:26:49.568726 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 03:26:49.568730 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 03:26:49.568735 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 03:26:49.568739 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 03:26:49.568744 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 03:26:49.568748 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 03:26:49.568752 kernel: Using GB pages for direct mapping Dec 13 03:26:49.568757 kernel: ACPI: Early table checksum verification disabled Dec 13 03:26:49.568762 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 03:26:49.568766 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 03:26:49.568770 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 03:26:49.568775 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 03:26:49.568781 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 03:26:49.568786 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 03:26:49.568791 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 03:26:49.568796 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 03:26:49.568800 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 03:26:49.568805 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 03:26:49.568810 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 03:26:49.568814 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 03:26:49.568819 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 03:26:49.568823 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:26:49.568829 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 03:26:49.568834 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 03:26:49.568838 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:26:49.568843 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:26:49.568848 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 03:26:49.568852 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 03:26:49.568857 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:26:49.568861 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:26:49.568867 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 03:26:49.568872 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 03:26:49.568876 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 03:26:49.568881 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 03:26:49.568885 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 03:26:49.568890 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 03:26:49.568895 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 03:26:49.568899 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 03:26:49.568904 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 03:26:49.568909 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 03:26:49.568914 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 03:26:49.568919 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 03:26:49.568923 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 03:26:49.568928 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 03:26:49.568933 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 03:26:49.568937 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 03:26:49.568942 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 03:26:49.568947 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 03:26:49.568952 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 03:26:49.568957 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 03:26:49.568961 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 03:26:49.568966 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 03:26:49.568970 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 03:26:49.568975 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 03:26:49.568980 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 03:26:49.568984 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 03:26:49.568990 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 03:26:49.568994 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 03:26:49.568999 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 03:26:49.569003 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 03:26:49.569008 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 03:26:49.569013 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 03:26:49.569017 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 03:26:49.569022 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 03:26:49.569026 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 03:26:49.569032 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 03:26:49.569036 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 03:26:49.569041 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 03:26:49.569046 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 03:26:49.569050 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 03:26:49.569055 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 03:26:49.569060 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 03:26:49.569064 kernel: No NUMA configuration found Dec 13 03:26:49.569069 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 03:26:49.569074 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 03:26:49.569079 kernel: Zone ranges: Dec 13 03:26:49.569084 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 03:26:49.569088 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 03:26:49.569093 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 03:26:49.569097 kernel: Movable zone start for each node Dec 13 03:26:49.569102 kernel: Early memory node ranges Dec 13 03:26:49.569107 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 03:26:49.569111 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 03:26:49.569116 kernel: node 0: [mem 0x0000000040400000-0x000000008266efff] Dec 13 03:26:49.569121 kernel: node 0: [mem 0x0000000082671000-0x000000008afccfff] Dec 13 03:26:49.569126 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 03:26:49.569131 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 03:26:49.569135 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 03:26:49.569140 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 03:26:49.569145 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 03:26:49.569153 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 03:26:49.569158 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 03:26:49.569163 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 03:26:49.569168 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 03:26:49.569174 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 03:26:49.569179 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 03:26:49.569184 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 03:26:49.569189 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 03:26:49.569194 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 03:26:49.569199 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 03:26:49.569204 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 03:26:49.569209 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 03:26:49.569214 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 03:26:49.569219 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 03:26:49.569224 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 03:26:49.569229 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 03:26:49.569234 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 03:26:49.569239 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 03:26:49.569244 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 03:26:49.569249 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 03:26:49.569254 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 03:26:49.569259 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 03:26:49.569264 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 03:26:49.569269 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 03:26:49.569274 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 03:26:49.569279 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 03:26:49.569284 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 03:26:49.569289 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 03:26:49.569294 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 03:26:49.569300 kernel: TSC deadline timer available Dec 13 03:26:49.569305 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 03:26:49.569310 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 03:26:49.569315 kernel: Booting paravirtualized kernel on bare hardware Dec 13 03:26:49.569320 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 03:26:49.569325 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 03:26:49.569330 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 03:26:49.569335 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 03:26:49.569342 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 03:26:49.569348 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 03:26:49.569353 kernel: Policy zone: Normal Dec 13 03:26:49.569359 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:26:49.569364 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 03:26:49.569369 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 03:26:49.569374 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 03:26:49.569379 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 03:26:49.569398 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 730116K reserved, 0K cma-reserved) Dec 13 03:26:49.569403 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 03:26:49.569408 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 03:26:49.569413 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 03:26:49.569418 kernel: rcu: Hierarchical RCU implementation. Dec 13 03:26:49.569423 kernel: rcu: RCU event tracing is enabled. Dec 13 03:26:49.569428 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 03:26:49.569433 kernel: Rude variant of Tasks RCU enabled. Dec 13 03:26:49.569438 kernel: Tracing variant of Tasks RCU enabled. Dec 13 03:26:49.569443 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 03:26:49.569449 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 03:26:49.569453 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 03:26:49.569458 kernel: random: crng init done Dec 13 03:26:49.569463 kernel: Console: colour dummy device 80x25 Dec 13 03:26:49.569468 kernel: printk: console [tty0] enabled Dec 13 03:26:49.569473 kernel: printk: console [ttyS1] enabled Dec 13 03:26:49.569478 kernel: ACPI: Core revision 20210730 Dec 13 03:26:49.569482 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 03:26:49.569487 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 03:26:49.569493 kernel: DMAR: Host address width 39 Dec 13 03:26:49.569498 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 03:26:49.569503 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 03:26:49.569508 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 03:26:49.569512 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 03:26:49.569517 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 03:26:49.569522 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 03:26:49.569527 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 03:26:49.569532 kernel: x2apic enabled Dec 13 03:26:49.569537 kernel: Switched APIC routing to cluster x2apic. Dec 13 03:26:49.569542 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 03:26:49.569547 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 03:26:49.569552 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 03:26:49.569557 kernel: process: using mwait in idle threads Dec 13 03:26:49.569562 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 03:26:49.569567 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 03:26:49.569571 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 03:26:49.569576 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 03:26:49.569582 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 03:26:49.569587 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 03:26:49.569592 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 03:26:49.569596 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 03:26:49.569601 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 03:26:49.569606 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 03:26:49.569611 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 03:26:49.569615 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 03:26:49.569620 kernel: TAA: Mitigation: TSX disabled Dec 13 03:26:49.569625 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 03:26:49.569630 kernel: SRBDS: Mitigation: Microcode Dec 13 03:26:49.569635 kernel: GDS: Vulnerable: No microcode Dec 13 03:26:49.569640 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 03:26:49.569645 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 03:26:49.569650 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 03:26:49.569655 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 03:26:49.569659 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 03:26:49.569664 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 03:26:49.569669 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 03:26:49.569674 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 03:26:49.569678 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 03:26:49.569683 kernel: Freeing SMP alternatives memory: 32K Dec 13 03:26:49.569689 kernel: pid_max: default: 32768 minimum: 301 Dec 13 03:26:49.569693 kernel: LSM: Security Framework initializing Dec 13 03:26:49.569698 kernel: SELinux: Initializing. Dec 13 03:26:49.569703 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 03:26:49.569708 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 03:26:49.569713 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 03:26:49.569717 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 03:26:49.569722 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 03:26:49.569727 kernel: ... version: 4 Dec 13 03:26:49.569732 kernel: ... bit width: 48 Dec 13 03:26:49.569737 kernel: ... generic registers: 4 Dec 13 03:26:49.569742 kernel: ... value mask: 0000ffffffffffff Dec 13 03:26:49.569747 kernel: ... max period: 00007fffffffffff Dec 13 03:26:49.569752 kernel: ... fixed-purpose events: 3 Dec 13 03:26:49.569757 kernel: ... event mask: 000000070000000f Dec 13 03:26:49.569762 kernel: signal: max sigframe size: 2032 Dec 13 03:26:49.569767 kernel: rcu: Hierarchical SRCU implementation. Dec 13 03:26:49.569771 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 03:26:49.569776 kernel: smp: Bringing up secondary CPUs ... Dec 13 03:26:49.569781 kernel: x86: Booting SMP configuration: Dec 13 03:26:49.569787 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 03:26:49.569792 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 03:26:49.569797 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 03:26:49.569801 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 03:26:49.569806 kernel: smpboot: Max logical packages: 1 Dec 13 03:26:49.569811 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 03:26:49.569816 kernel: devtmpfs: initialized Dec 13 03:26:49.569821 kernel: x86/mm: Memory block size: 128MB Dec 13 03:26:49.569826 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8266f000-0x8266ffff] (4096 bytes) Dec 13 03:26:49.569831 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 03:26:49.569836 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 03:26:49.569841 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 03:26:49.569846 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 03:26:49.569851 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 03:26:49.569856 kernel: audit: initializing netlink subsys (disabled) Dec 13 03:26:49.569861 kernel: audit: type=2000 audit(1734060404.041:1): state=initialized audit_enabled=0 res=1 Dec 13 03:26:49.569865 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 03:26:49.569870 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 03:26:49.569876 kernel: cpuidle: using governor menu Dec 13 03:26:49.569881 kernel: ACPI: bus type PCI registered Dec 13 03:26:49.569885 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 03:26:49.569890 kernel: dca service started, version 1.12.1 Dec 13 03:26:49.569895 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 03:26:49.569900 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 03:26:49.569905 kernel: PCI: Using configuration type 1 for base access Dec 13 03:26:49.569910 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 03:26:49.569914 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 03:26:49.569920 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 03:26:49.569925 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 03:26:49.569930 kernel: ACPI: Added _OSI(Module Device) Dec 13 03:26:49.569934 kernel: ACPI: Added _OSI(Processor Device) Dec 13 03:26:49.569939 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 03:26:49.569944 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 03:26:49.569949 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 03:26:49.569954 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 03:26:49.569958 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 03:26:49.569964 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 03:26:49.569969 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:26:49.569974 kernel: ACPI: SSDT 0xFFFF9837C0218D00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 03:26:49.569979 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 03:26:49.569983 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:26:49.569988 kernel: ACPI: SSDT 0xFFFF9837C1AE0C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 03:26:49.569993 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:26:49.569998 kernel: ACPI: SSDT 0xFFFF9837C1A5D800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 03:26:49.570003 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:26:49.570008 kernel: ACPI: SSDT 0xFFFF9837C1B4C800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 03:26:49.570013 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:26:49.570018 kernel: ACPI: SSDT 0xFFFF9837C0148000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 03:26:49.570022 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:26:49.570027 kernel: ACPI: SSDT 0xFFFF9837C1AE3400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 03:26:49.570032 kernel: ACPI: Interpreter enabled Dec 13 03:26:49.570037 kernel: ACPI: PM: (supports S0 S5) Dec 13 03:26:49.570042 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 03:26:49.570047 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 03:26:49.570051 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 03:26:49.570057 kernel: HEST: Table parsing has been initialized. Dec 13 03:26:49.570062 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 03:26:49.570067 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 03:26:49.570071 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 03:26:49.570076 kernel: ACPI: PM: Power Resource [USBC] Dec 13 03:26:49.570081 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 03:26:49.570086 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 03:26:49.570091 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 03:26:49.570095 kernel: ACPI: PM: Power Resource [WRST] Dec 13 03:26:49.570101 kernel: ACPI: PM: Power Resource [FN00] Dec 13 03:26:49.570106 kernel: ACPI: PM: Power Resource [FN01] Dec 13 03:26:49.570111 kernel: ACPI: PM: Power Resource [FN02] Dec 13 03:26:49.570115 kernel: ACPI: PM: Power Resource [FN03] Dec 13 03:26:49.570120 kernel: ACPI: PM: Power Resource [FN04] Dec 13 03:26:49.570125 kernel: ACPI: PM: Power Resource [PIN] Dec 13 03:26:49.570130 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 03:26:49.570198 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 03:26:49.570245 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 03:26:49.570287 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 03:26:49.570294 kernel: PCI host bridge to bus 0000:00 Dec 13 03:26:49.570338 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 03:26:49.570411 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 03:26:49.570448 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 03:26:49.570484 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 03:26:49.570524 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 03:26:49.570559 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 03:26:49.570609 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 03:26:49.570661 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 03:26:49.570705 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.570751 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 03:26:49.570796 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 03:26:49.570843 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 03:26:49.570886 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 03:26:49.570932 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 03:26:49.570973 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 03:26:49.571017 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 03:26:49.571065 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 03:26:49.571108 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 03:26:49.571149 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 03:26:49.571194 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 03:26:49.571236 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:26:49.571284 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 03:26:49.571328 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:26:49.571393 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 03:26:49.571453 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 03:26:49.571494 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 03:26:49.571540 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 03:26:49.571581 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 03:26:49.571623 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 03:26:49.571670 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 03:26:49.571713 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 03:26:49.571754 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 03:26:49.571798 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 03:26:49.571842 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 03:26:49.571884 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 03:26:49.571933 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 03:26:49.571976 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 03:26:49.572019 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 03:26:49.572060 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 03:26:49.572101 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 03:26:49.572147 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 03:26:49.572190 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.572236 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 03:26:49.572282 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.572330 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 03:26:49.572393 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.572455 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 03:26:49.572497 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.572544 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 03:26:49.572588 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.572635 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 03:26:49.572678 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:26:49.572725 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 03:26:49.572771 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 03:26:49.572813 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 03:26:49.572854 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 03:26:49.572902 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 03:26:49.572944 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 03:26:49.572995 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 03:26:49.573040 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 03:26:49.573084 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 03:26:49.573127 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 03:26:49.573171 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 03:26:49.573214 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 03:26:49.573263 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 03:26:49.573309 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 03:26:49.573378 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 03:26:49.573442 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 03:26:49.573485 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 03:26:49.573530 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 03:26:49.573573 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 03:26:49.573616 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 03:26:49.573660 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:26:49.573703 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 03:26:49.573751 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 03:26:49.573796 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 03:26:49.573839 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 03:26:49.573882 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 03:26:49.573925 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 03:26:49.573969 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.574013 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 03:26:49.574056 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 03:26:49.574099 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 03:26:49.574146 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 03:26:49.574227 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 03:26:49.574293 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 03:26:49.574339 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 03:26:49.574408 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 03:26:49.574452 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 03:26:49.574495 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 03:26:49.574538 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 03:26:49.574580 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 03:26:49.574623 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 03:26:49.574672 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 03:26:49.574716 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 03:26:49.574762 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 03:26:49.574805 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 03:26:49.574848 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 03:26:49.574890 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 03:26:49.574933 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:26:49.574981 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 03:26:49.575032 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 03:26:49.575080 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 03:26:49.575127 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 03:26:49.575173 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 03:26:49.575220 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 03:26:49.575266 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 03:26:49.575312 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 03:26:49.575381 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 03:26:49.575447 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 03:26:49.575492 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:26:49.575500 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 03:26:49.575505 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 03:26:49.575512 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 03:26:49.575517 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 03:26:49.575522 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 03:26:49.575527 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 03:26:49.575532 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 03:26:49.575538 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 03:26:49.575543 kernel: iommu: Default domain type: Translated Dec 13 03:26:49.575548 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 03:26:49.575593 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 03:26:49.575639 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 03:26:49.575684 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 03:26:49.575692 kernel: vgaarb: loaded Dec 13 03:26:49.575697 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 03:26:49.575703 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Dec 13 03:26:49.575709 kernel: PTP clock support registered Dec 13 03:26:49.575714 kernel: PCI: Using ACPI for IRQ routing Dec 13 03:26:49.575720 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 03:26:49.575725 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 03:26:49.575731 kernel: e820: reserve RAM buffer [mem 0x8266f000-0x83ffffff] Dec 13 03:26:49.575736 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 03:26:49.575741 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 03:26:49.575746 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 03:26:49.575751 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 03:26:49.575756 kernel: clocksource: Switched to clocksource tsc-early Dec 13 03:26:49.575762 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 03:26:49.575767 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 03:26:49.575772 kernel: pnp: PnP ACPI init Dec 13 03:26:49.575816 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 03:26:49.575860 kernel: pnp 00:02: [dma 0 disabled] Dec 13 03:26:49.575901 kernel: pnp 00:03: [dma 0 disabled] Dec 13 03:26:49.575946 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 03:26:49.575985 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 03:26:49.576026 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 03:26:49.576066 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 03:26:49.576104 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 03:26:49.576142 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 03:26:49.576181 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 03:26:49.576219 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 03:26:49.576256 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 03:26:49.576294 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 03:26:49.576332 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 03:26:49.576418 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 03:26:49.576456 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 03:26:49.576496 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 03:26:49.576534 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 03:26:49.576572 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 03:26:49.576609 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 03:26:49.576649 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 03:26:49.576689 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 03:26:49.576697 kernel: pnp: PnP ACPI: found 10 devices Dec 13 03:26:49.576704 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 03:26:49.576709 kernel: NET: Registered PF_INET protocol family Dec 13 03:26:49.576714 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:26:49.576720 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 03:26:49.576725 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 03:26:49.576730 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:26:49.576735 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 03:26:49.576741 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 03:26:49.576746 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 03:26:49.576752 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 03:26:49.576757 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 03:26:49.576762 kernel: NET: Registered PF_XDP protocol family Dec 13 03:26:49.576806 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 03:26:49.576848 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 03:26:49.576890 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 03:26:49.576935 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 03:26:49.576979 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 03:26:49.577027 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 03:26:49.577071 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 03:26:49.577115 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 03:26:49.577158 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 03:26:49.577201 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:26:49.577242 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 03:26:49.577287 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 03:26:49.577329 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 03:26:49.577420 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 03:26:49.577463 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 03:26:49.577504 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 03:26:49.577547 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 03:26:49.577588 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 03:26:49.577634 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 03:26:49.577678 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 03:26:49.577721 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:26:49.577763 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 03:26:49.577806 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 03:26:49.577848 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:26:49.577886 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 03:26:49.577924 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 03:26:49.577960 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 03:26:49.577998 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 03:26:49.578035 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 03:26:49.578071 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 03:26:49.578115 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 03:26:49.578156 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:26:49.578201 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 03:26:49.578242 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 03:26:49.578284 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 03:26:49.578325 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 03:26:49.578395 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 03:26:49.578455 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 03:26:49.578496 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 03:26:49.578538 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 03:26:49.578547 kernel: PCI: CLS 64 bytes, default 64 Dec 13 03:26:49.578553 kernel: DMAR: No ATSR found Dec 13 03:26:49.578558 kernel: DMAR: No SATC found Dec 13 03:26:49.578563 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 03:26:49.578605 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 03:26:49.578650 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 03:26:49.578692 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 03:26:49.578735 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 03:26:49.578779 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 03:26:49.578821 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 03:26:49.578863 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 03:26:49.578905 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 03:26:49.578948 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 03:26:49.578990 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 03:26:49.579032 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 03:26:49.579075 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 03:26:49.579116 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 03:26:49.579161 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 03:26:49.579204 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 03:26:49.579246 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 03:26:49.579288 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 03:26:49.579330 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 03:26:49.579421 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 03:26:49.579464 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 03:26:49.579506 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 03:26:49.579552 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 03:26:49.579597 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 03:26:49.579640 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 03:26:49.579685 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 03:26:49.579728 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 03:26:49.579774 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 03:26:49.579782 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 03:26:49.579787 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 03:26:49.579794 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 03:26:49.579799 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 03:26:49.579804 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 03:26:49.579810 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 03:26:49.579815 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 03:26:49.579859 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 03:26:49.579867 kernel: Initialise system trusted keyrings Dec 13 03:26:49.579873 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 03:26:49.579879 kernel: Key type asymmetric registered Dec 13 03:26:49.579884 kernel: Asymmetric key parser 'x509' registered Dec 13 03:26:49.579890 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 03:26:49.579895 kernel: io scheduler mq-deadline registered Dec 13 03:26:49.579900 kernel: io scheduler kyber registered Dec 13 03:26:49.579905 kernel: io scheduler bfq registered Dec 13 03:26:49.579949 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 03:26:49.579992 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 03:26:49.580035 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 03:26:49.580081 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 03:26:49.580123 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 03:26:49.580167 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 03:26:49.580213 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 03:26:49.580221 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 03:26:49.580227 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 03:26:49.580232 kernel: pstore: Registered erst as persistent store backend Dec 13 03:26:49.580238 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 03:26:49.580244 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 03:26:49.580249 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 03:26:49.580254 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 03:26:49.580259 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 03:26:49.580305 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 03:26:49.580313 kernel: i8042: PNP: No PS/2 controller found. Dec 13 03:26:49.580354 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 03:26:49.580440 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 03:26:49.580480 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T03:26:48 UTC (1734060408) Dec 13 03:26:49.580518 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 03:26:49.580526 kernel: fail to initialize ptp_kvm Dec 13 03:26:49.580531 kernel: intel_pstate: Intel P-state driver initializing Dec 13 03:26:49.580536 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 03:26:49.580542 kernel: intel_pstate: HWP enabled Dec 13 03:26:49.580547 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 03:26:49.580552 kernel: vesafb: scrolling: redraw Dec 13 03:26:49.580559 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 03:26:49.580564 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000004bb8a6eb, using 768k, total 768k Dec 13 03:26:49.580569 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 03:26:49.580574 kernel: fb0: VESA VGA frame buffer device Dec 13 03:26:49.580580 kernel: NET: Registered PF_INET6 protocol family Dec 13 03:26:49.580585 kernel: Segment Routing with IPv6 Dec 13 03:26:49.580590 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 03:26:49.580595 kernel: NET: Registered PF_PACKET protocol family Dec 13 03:26:49.580600 kernel: Key type dns_resolver registered Dec 13 03:26:49.580606 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 03:26:49.580611 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 03:26:49.580617 kernel: IPI shorthand broadcast: enabled Dec 13 03:26:49.580622 kernel: sched_clock: Marking stable (1680299917, 1339934740)->(4464012521, -1443777864) Dec 13 03:26:49.580627 kernel: registered taskstats version 1 Dec 13 03:26:49.580633 kernel: Loading compiled-in X.509 certificates Dec 13 03:26:49.580638 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 03:26:49.580643 kernel: Key type .fscrypt registered Dec 13 03:26:49.580648 kernel: Key type fscrypt-provisioning registered Dec 13 03:26:49.580654 kernel: pstore: Using crash dump compression: deflate Dec 13 03:26:49.580659 kernel: ima: Allocated hash algorithm: sha1 Dec 13 03:26:49.580664 kernel: ima: No architecture policies found Dec 13 03:26:49.580670 kernel: clk: Disabling unused clocks Dec 13 03:26:49.580675 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 03:26:49.580680 kernel: Write protecting the kernel read-only data: 28672k Dec 13 03:26:49.580685 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 03:26:49.580691 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 03:26:49.580696 kernel: Run /init as init process Dec 13 03:26:49.580702 kernel: with arguments: Dec 13 03:26:49.580707 kernel: /init Dec 13 03:26:49.580712 kernel: with environment: Dec 13 03:26:49.580717 kernel: HOME=/ Dec 13 03:26:49.580722 kernel: TERM=linux Dec 13 03:26:49.580727 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 03:26:49.580733 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:26:49.580740 systemd[1]: Detected architecture x86-64. Dec 13 03:26:49.580746 systemd[1]: Running in initrd. Dec 13 03:26:49.580752 systemd[1]: No hostname configured, using default hostname. Dec 13 03:26:49.580757 systemd[1]: Hostname set to <localhost>. Dec 13 03:26:49.580762 systemd[1]: Initializing machine ID from random generator. Dec 13 03:26:49.580768 systemd[1]: Queued start job for default target initrd.target. Dec 13 03:26:49.580773 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:26:49.580779 systemd[1]: Reached target cryptsetup.target. Dec 13 03:26:49.580784 systemd[1]: Reached target paths.target. Dec 13 03:26:49.580790 systemd[1]: Reached target slices.target. Dec 13 03:26:49.580795 systemd[1]: Reached target swap.target. Dec 13 03:26:49.580800 systemd[1]: Reached target timers.target. Dec 13 03:26:49.580806 systemd[1]: Listening on iscsid.socket. Dec 13 03:26:49.580811 systemd[1]: Listening on iscsiuio.socket. Dec 13 03:26:49.580817 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 03:26:49.580822 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 03:26:49.580828 systemd[1]: Listening on systemd-journald.socket. Dec 13 03:26:49.580833 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Dec 13 03:26:49.580839 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Dec 13 03:26:49.580844 kernel: clocksource: Switched to clocksource tsc Dec 13 03:26:49.580849 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:26:49.580855 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:26:49.580860 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:26:49.580866 systemd[1]: Reached target sockets.target. Dec 13 03:26:49.580871 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:26:49.580877 systemd[1]: Finished network-cleanup.service. Dec 13 03:26:49.580883 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 03:26:49.580888 systemd[1]: Starting systemd-journald.service... Dec 13 03:26:49.580894 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:26:49.580902 systemd-journald[267]: Journal started Dec 13 03:26:49.580927 systemd-journald[267]: Runtime Journal (/run/log/journal/db6d22a49d914311bcd19f6dc810a7b1) is 8.0M, max 640.1M, 632.1M free. Dec 13 03:26:49.582693 systemd-modules-load[268]: Inserted module 'overlay' Dec 13 03:26:49.588000 audit: BPF prog-id=6 op=LOAD Dec 13 03:26:49.606611 kernel: audit: type=1334 audit(1734060409.588:2): prog-id=6 op=LOAD Dec 13 03:26:49.606628 systemd[1]: Starting systemd-resolved.service... Dec 13 03:26:49.655395 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 03:26:49.655411 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 03:26:49.688386 kernel: Bridge firewalling registered Dec 13 03:26:49.688401 systemd[1]: Started systemd-journald.service. Dec 13 03:26:49.702378 systemd-modules-load[268]: Inserted module 'br_netfilter' Dec 13 03:26:49.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.704952 systemd-resolved[270]: Positive Trust Anchors: Dec 13 03:26:49.808879 kernel: audit: type=1130 audit(1734060409.710:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.808890 kernel: SCSI subsystem initialized Dec 13 03:26:49.808898 kernel: audit: type=1130 audit(1734060409.766:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.704957 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:26:49.909237 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 03:26:49.909254 kernel: audit: type=1130 audit(1734060409.837:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.909262 kernel: device-mapper: uevent: version 1.0.3 Dec 13 03:26:49.909269 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 03:26:49.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.704976 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:26:50.000595 kernel: audit: type=1130 audit(1734060409.935:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.706545 systemd-resolved[270]: Defaulting to hostname 'linux'. Dec 13 03:26:50.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.710567 systemd[1]: Started systemd-resolved.service. Dec 13 03:26:50.108591 kernel: audit: type=1130 audit(1734060410.009:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.108607 kernel: audit: type=1130 audit(1734060410.062:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:49.766474 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:26:49.837465 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 03:26:49.932455 systemd-modules-load[268]: Inserted module 'dm_multipath' Dec 13 03:26:49.935646 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:26:50.009699 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 03:26:50.062736 systemd[1]: Reached target nss-lookup.target. Dec 13 03:26:50.117962 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 03:26:50.137901 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:26:50.138205 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:26:50.141027 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:26:50.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.141831 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:26:50.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.217571 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 03:26:50.254446 kernel: audit: type=1130 audit(1734060410.140:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.254458 kernel: audit: type=1130 audit(1734060410.189:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.246958 systemd[1]: Starting dracut-cmdline.service... Dec 13 03:26:50.269446 dracut-cmdline[292]: dracut-dracut-053 Dec 13 03:26:50.269446 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 03:26:50.269446 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:26:50.338415 kernel: Loading iSCSI transport class v2.0-870. Dec 13 03:26:50.338427 kernel: iscsi: registered transport (tcp) Dec 13 03:26:50.391876 kernel: iscsi: registered transport (qla4xxx) Dec 13 03:26:50.391892 kernel: QLogic iSCSI HBA Driver Dec 13 03:26:50.408132 systemd[1]: Finished dracut-cmdline.service. Dec 13 03:26:50.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:50.417080 systemd[1]: Starting dracut-pre-udev.service... Dec 13 03:26:50.475382 kernel: raid6: avx2x4 gen() 35893 MB/s Dec 13 03:26:50.511378 kernel: raid6: avx2x4 xor() 12358 MB/s Dec 13 03:26:50.546381 kernel: raid6: avx2x2 gen() 53579 MB/s Dec 13 03:26:50.581425 kernel: raid6: avx2x2 xor() 32074 MB/s Dec 13 03:26:50.616378 kernel: raid6: avx2x1 gen() 45225 MB/s Dec 13 03:26:50.650377 kernel: raid6: avx2x1 xor() 27903 MB/s Dec 13 03:26:50.684378 kernel: raid6: sse2x4 gen() 21287 MB/s Dec 13 03:26:50.718424 kernel: raid6: sse2x4 xor() 11983 MB/s Dec 13 03:26:50.752426 kernel: raid6: sse2x2 gen() 21634 MB/s Dec 13 03:26:50.786420 kernel: raid6: sse2x2 xor() 13377 MB/s Dec 13 03:26:50.820392 kernel: raid6: sse2x1 gen() 18309 MB/s Dec 13 03:26:50.872330 kernel: raid6: sse2x1 xor() 8928 MB/s Dec 13 03:26:50.872349 kernel: raid6: using algorithm avx2x2 gen() 53579 MB/s Dec 13 03:26:50.872358 kernel: raid6: .... xor() 32074 MB/s, rmw enabled Dec 13 03:26:50.890558 kernel: raid6: using avx2x2 recovery algorithm Dec 13 03:26:50.936347 kernel: xor: automatically using best checksumming function avx Dec 13 03:26:51.015353 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 03:26:51.020768 systemd[1]: Finished dracut-pre-udev.service. Dec 13 03:26:51.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:51.030000 audit: BPF prog-id=7 op=LOAD Dec 13 03:26:51.030000 audit: BPF prog-id=8 op=LOAD Dec 13 03:26:51.031374 systemd[1]: Starting systemd-udevd.service... Dec 13 03:26:51.039018 systemd-udevd[474]: Using default interface naming scheme 'v252'. Dec 13 03:26:51.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:51.045856 systemd[1]: Started systemd-udevd.service. Dec 13 03:26:51.086400 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Dec 13 03:26:51.063461 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 03:26:51.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:51.090867 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 03:26:51.104113 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:26:51.154888 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:26:51.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:51.182352 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 03:26:51.184352 kernel: libata version 3.00 loaded. Dec 13 03:26:51.184371 kernel: ACPI: bus type USB registered Dec 13 03:26:51.219344 kernel: usbcore: registered new interface driver usbfs Dec 13 03:26:51.219374 kernel: usbcore: registered new interface driver hub Dec 13 03:26:51.237166 kernel: usbcore: registered new device driver usb Dec 13 03:26:51.292750 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 03:26:51.292788 kernel: AES CTR mode by8 optimization enabled Dec 13 03:26:51.294349 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 03:26:51.816122 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Dec 13 03:26:51.912731 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 03:26:51.912791 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 03:26:51.912846 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 03:26:51.912896 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 03:26:51.912946 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 03:26:51.912995 kernel: scsi host0: ahci Dec 13 03:26:51.913051 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 03:26:51.913101 kernel: scsi host1: ahci Dec 13 03:26:51.913155 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 03:26:51.913204 kernel: scsi host2: ahci Dec 13 03:26:51.913256 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 03:26:51.913303 kernel: scsi host3: ahci Dec 13 03:26:51.913366 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 03:26:51.913414 kernel: scsi host4: ahci Dec 13 03:26:51.913468 kernel: hub 1-0:1.0: USB hub found Dec 13 03:26:51.913526 kernel: scsi host5: ahci Dec 13 03:26:51.913579 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 03:26:51.913586 kernel: hub 1-0:1.0: 16 ports detected Dec 13 03:26:51.913639 kernel: hub 2-0:1.0: USB hub found Dec 13 03:26:51.913693 kernel: hub 2-0:1.0: 10 ports detected Dec 13 03:26:51.913746 kernel: scsi host6: ahci Dec 13 03:26:51.913797 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 03:26:51.913805 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Dec 13 03:26:51.913811 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 03:26:51.913861 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Dec 13 03:26:51.913868 kernel: pps pps0: new PPS source ptp1 Dec 13 03:26:51.913927 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 03:26:51.913980 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Dec 13 03:26:51.913989 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 03:26:51.914041 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Dec 13 03:26:51.914048 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 03:26:51.914097 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Dec 13 03:26:51.914104 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:54 Dec 13 03:26:51.914152 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Dec 13 03:26:51.914160 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 03:26:51.914209 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Dec 13 03:26:51.914217 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 03:26:51.914232 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 03:26:51.914281 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 03:26:51.914331 kernel: pps pps1: new PPS source ptp2 Dec 13 03:26:51.914386 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Dec 13 03:26:52.792075 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 03:26:52.792146 kernel: hub 1-14:1.0: USB hub found Dec 13 03:26:52.792214 kernel: hub 1-14:1.0: 4 ports detected Dec 13 03:26:52.792270 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 03:26:52.792322 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 03:26:52.792382 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:55 Dec 13 03:26:52.792432 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 03:26:52.792482 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 03:26:52.792532 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 03:26:52.792542 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 03:26:52.792548 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 03:26:52.792555 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 03:26:52.792561 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 03:26:52.792567 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 03:26:52.792661 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 03:26:52.792669 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 03:26:52.792675 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 03:26:52.792731 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 03:26:52.792739 kernel: port_module: 9 callbacks suppressed Dec 13 03:26:52.792745 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 03:26:52.792796 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 03:26:52.792803 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 03:26:52.792852 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 03:26:52.792859 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 03:26:52.792867 kernel: ata1.00: Features: NCQ-prio Dec 13 03:26:52.792874 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 03:26:52.792880 kernel: ata2.00: Features: NCQ-prio Dec 13 03:26:52.792886 kernel: ata1.00: configured for UDMA/133 Dec 13 03:26:52.792893 kernel: ata2.00: configured for UDMA/133 Dec 13 03:26:52.792899 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 03:26:53.100844 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 03:26:53.101022 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 03:26:53.101164 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 03:26:53.101253 kernel: usbcore: registered new interface driver usbhid Dec 13 03:26:53.101264 kernel: usbhid: USB HID core driver Dec 13 03:26:53.101275 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 03:26:53.101365 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 03:26:53.101378 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:53.101388 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:26:53.101399 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 03:26:53.101485 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 03:26:53.101567 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 03:26:53.101662 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 03:26:53.101768 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 03:26:53.101781 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 03:26:53.101878 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 03:26:53.101944 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 03:26:53.102012 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 03:26:53.102073 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 03:26:53.102130 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 03:26:53.102183 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 03:26:53.102382 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 03:26:53.102516 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:26:53.102528 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:53.102540 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:26:53.102553 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 03:26:53.102681 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 03:26:53.102738 kernel: GPT:9289727 != 937703087 Dec 13 03:26:53.102749 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 03:26:53.102760 kernel: GPT:9289727 != 937703087 Dec 13 03:26:53.102770 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 03:26:53.102781 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:26:53.102792 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:53.102803 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 03:26:53.102882 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 03:26:53.127288 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 03:26:53.168789 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (544) Dec 13 03:26:53.168803 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 03:26:53.151672 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 03:26:53.183289 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 03:26:53.196585 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 03:26:53.221892 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:26:53.243780 systemd[1]: Starting disk-uuid.service... Dec 13 03:26:53.265510 disk-uuid[692]: Primary Header is updated. Dec 13 03:26:53.265510 disk-uuid[692]: Secondary Entries is updated. Dec 13 03:26:53.265510 disk-uuid[692]: Secondary Header is updated. Dec 13 03:26:53.318437 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:53.318450 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:26:53.318457 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:53.318465 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:26:53.341051 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:53.358386 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:26:54.340313 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:26:54.358396 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:26:54.358426 disk-uuid[693]: The operation has completed successfully. Dec 13 03:26:54.391968 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 03:26:54.484160 kernel: audit: type=1130 audit(1734060414.399:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.484179 kernel: audit: type=1131 audit(1734060414.399:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.392011 systemd[1]: Finished disk-uuid.service. Dec 13 03:26:54.512452 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 03:26:54.403016 systemd[1]: Starting verity-setup.service... Dec 13 03:26:54.584615 systemd[1]: Found device dev-mapper-usr.device. Dec 13 03:26:54.595639 systemd[1]: Mounting sysusr-usr.mount... Dec 13 03:26:54.600654 systemd[1]: Finished verity-setup.service. Dec 13 03:26:54.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.657348 kernel: audit: type=1130 audit(1734060414.611:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.712018 systemd[1]: Mounted sysusr-usr.mount. Dec 13 03:26:54.726447 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 03:26:54.719638 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 03:26:54.803670 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:26:54.803685 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:26:54.803693 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:26:54.803699 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:26:54.720041 systemd[1]: Starting ignition-setup.service... Dec 13 03:26:54.741806 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 03:26:54.875430 kernel: audit: type=1130 audit(1734060414.830:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.812818 systemd[1]: Finished ignition-setup.service. Dec 13 03:26:54.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.830691 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 03:26:54.960447 kernel: audit: type=1130 audit(1734060414.884:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.960469 kernel: audit: type=1334 audit(1734060414.939:24): prog-id=9 op=LOAD Dec 13 03:26:54.939000 audit: BPF prog-id=9 op=LOAD Dec 13 03:26:54.885020 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 03:26:54.941060 systemd[1]: Starting systemd-networkd.service... Dec 13 03:26:54.976429 systemd-networkd[875]: lo: Link UP Dec 13 03:26:54.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.017974 ignition[870]: Ignition 2.14.0 Dec 13 03:26:55.053594 kernel: audit: type=1130 audit(1734060414.994:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.976432 systemd-networkd[875]: lo: Gained carrier Dec 13 03:26:55.017979 ignition[870]: Stage: fetch-offline Dec 13 03:26:54.976734 systemd-networkd[875]: Enumeration completed Dec 13 03:26:55.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.018005 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:26:55.202590 kernel: audit: type=1130 audit(1734060415.079:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.202609 kernel: audit: type=1130 audit(1734060415.134:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.202617 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:26:55.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:54.976780 systemd[1]: Started systemd-networkd.service. Dec 13 03:26:55.225469 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 03:26:55.018017 ignition[870]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:26:54.977456 systemd-networkd[875]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:26:55.020668 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:26:55.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.014619 systemd[1]: Reached target network.target. Dec 13 03:26:55.282410 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:26:55.282410 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 03:26:55.282410 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Dec 13 03:26:55.282410 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 03:26:55.282410 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 03:26:55.282410 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:26:55.282410 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 03:26:55.439442 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 03:26:55.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:26:55.020732 ignition[870]: parsed url from cmdline: "" Dec 13 03:26:55.031022 unknown[870]: fetched base config from "system" Dec 13 03:26:55.020734 ignition[870]: no config URL provided Dec 13 03:26:55.031026 unknown[870]: fetched user config from "system" Dec 13 03:26:55.020736 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:26:55.048111 systemd[1]: Starting iscsiuio.service... Dec 13 03:26:55.020749 ignition[870]: parsing config with SHA512: 8e4d29bc231373bf8ff842b0f42abfdeb858813a3636d1de929049b48c33cbab76f0c2a3ebbed6edeec40e6518440a575df8d0b048e0ae6b543187899947f0a7 Dec 13 03:26:55.061572 systemd[1]: Started iscsiuio.service. Dec 13 03:26:55.031245 ignition[870]: fetch-offline: fetch-offline passed Dec 13 03:26:55.079702 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 03:26:55.031247 ignition[870]: POST message to Packet Timeline Dec 13 03:26:55.134750 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 03:26:55.031252 ignition[870]: POST Status error: resource requires networking Dec 13 03:26:55.135224 systemd[1]: Starting ignition-kargs.service... Dec 13 03:26:55.031292 ignition[870]: Ignition finished successfully Dec 13 03:26:55.203527 systemd-networkd[875]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:26:55.206946 ignition[890]: Ignition 2.14.0 Dec 13 03:26:55.216885 systemd[1]: Starting iscsid.service... Dec 13 03:26:55.206950 ignition[890]: Stage: kargs Dec 13 03:26:55.236847 systemd[1]: Started iscsid.service. Dec 13 03:26:55.207005 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:26:55.258152 systemd[1]: Starting dracut-initqueue.service... Dec 13 03:26:55.207014 ignition[890]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:26:55.274585 systemd[1]: Finished dracut-initqueue.service. Dec 13 03:26:55.208314 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:26:55.291527 systemd[1]: Reached target remote-fs-pre.target. Dec 13 03:26:55.209885 ignition[890]: kargs: kargs passed Dec 13 03:26:55.310547 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:26:55.209889 ignition[890]: POST message to Packet Timeline Dec 13 03:26:55.344607 systemd[1]: Reached target remote-fs.target. Dec 13 03:26:55.209899 ignition[890]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:26:55.376213 systemd[1]: Starting dracut-pre-mount.service... Dec 13 03:26:55.213808 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46231->[::1]:53: read: connection refused Dec 13 03:26:55.398563 systemd[1]: Finished dracut-pre-mount.service. Dec 13 03:26:55.414209 ignition[890]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 03:26:55.421933 systemd-networkd[875]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:26:55.414690 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60729->[::1]:53: read: connection refused Dec 13 03:26:55.450738 systemd-networkd[875]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:26:55.479233 systemd-networkd[875]: enp1s0f1np1: Link UP Dec 13 03:26:55.479483 systemd-networkd[875]: enp1s0f1np1: Gained carrier Dec 13 03:26:55.488751 systemd-networkd[875]: enp1s0f0np0: Link UP Dec 13 03:26:55.489070 systemd-networkd[875]: eno2: Link UP Dec 13 03:26:55.489376 systemd-networkd[875]: eno1: Link UP Dec 13 03:26:55.815373 ignition[890]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 03:26:55.816544 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40623->[::1]:53: read: connection refused Dec 13 03:26:56.247032 systemd-networkd[875]: enp1s0f0np0: Gained carrier Dec 13 03:26:56.255561 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 03:26:56.273521 systemd-networkd[875]: enp1s0f0np0: DHCPv4 address 147.75.202.71/31, gateway 147.75.202.70 acquired from 145.40.83.140 Dec 13 03:26:56.617052 ignition[890]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 03:26:56.618522 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:36965->[::1]:53: read: connection refused Dec 13 03:26:56.801935 systemd-networkd[875]: enp1s0f1np1: Gained IPv6LL Dec 13 03:26:58.145930 systemd-networkd[875]: enp1s0f0np0: Gained IPv6LL Dec 13 03:26:58.219517 ignition[890]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 03:26:58.220763 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34238->[::1]:53: read: connection refused Dec 13 03:27:01.424390 ignition[890]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 03:27:02.333456 ignition[890]: GET result: OK Dec 13 03:27:02.630377 ignition[890]: Ignition finished successfully Dec 13 03:27:02.635004 systemd[1]: Finished ignition-kargs.service. Dec 13 03:27:02.716826 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 03:27:02.716842 kernel: audit: type=1130 audit(1734060422.645:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:02.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:02.654615 ignition[917]: Ignition 2.14.0 Dec 13 03:27:02.647718 systemd[1]: Starting ignition-disks.service... Dec 13 03:27:02.654619 ignition[917]: Stage: disks Dec 13 03:27:02.654672 ignition[917]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:27:02.654680 ignition[917]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:27:02.656009 ignition[917]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:27:02.657183 ignition[917]: disks: disks passed Dec 13 03:27:02.657186 ignition[917]: POST message to Packet Timeline Dec 13 03:27:02.657197 ignition[917]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:27:03.194196 ignition[917]: GET result: OK Dec 13 03:27:03.544338 ignition[917]: Ignition finished successfully Dec 13 03:27:03.547730 systemd[1]: Finished ignition-disks.service. Dec 13 03:27:03.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:03.561872 systemd[1]: Reached target initrd-root-device.target. Dec 13 03:27:03.622669 kernel: audit: type=1130 audit(1734060423.561:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:03.622604 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:27:03.636566 systemd[1]: Reached target local-fs.target. Dec 13 03:27:03.636602 systemd[1]: Reached target sysinit.target. Dec 13 03:27:03.660661 systemd[1]: Reached target basic.target. Dec 13 03:27:03.674251 systemd[1]: Starting systemd-fsck-root.service... Dec 13 03:27:03.694265 systemd-fsck[933]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 03:27:03.707949 systemd[1]: Finished systemd-fsck-root.service. Dec 13 03:27:03.797332 kernel: audit: type=1130 audit(1734060423.717:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:03.797350 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 03:27:03.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:03.722797 systemd[1]: Mounting sysroot.mount... Dec 13 03:27:03.804985 systemd[1]: Mounted sysroot.mount. Dec 13 03:27:03.818625 systemd[1]: Reached target initrd-root-fs.target. Dec 13 03:27:03.826214 systemd[1]: Mounting sysroot-usr.mount... Dec 13 03:27:03.847387 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 03:27:03.861913 systemd[1]: Starting flatcar-static-network.service... Dec 13 03:27:03.877678 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 03:27:03.877767 systemd[1]: Reached target ignition-diskful.target. Dec 13 03:27:03.896851 systemd[1]: Mounted sysroot-usr.mount. Dec 13 03:27:03.919793 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:27:04.060981 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (944) Dec 13 03:27:04.060998 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:27:04.061009 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:27:04.061017 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:27:04.061024 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:27:04.061088 coreos-metadata[941]: Dec 13 03:27:04.003 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:27:04.122554 kernel: audit: type=1130 audit(1734060424.069:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:04.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:04.122598 coreos-metadata[940]: Dec 13 03:27:04.003 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:27:03.933394 systemd[1]: Starting initrd-setup-root.service... Dec 13 03:27:03.998537 systemd[1]: Finished initrd-setup-root.service. Dec 13 03:27:04.163610 initrd-setup-root[951]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 03:27:04.072379 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:27:04.252583 kernel: audit: type=1130 audit(1734060424.189:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:04.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:04.252622 initrd-setup-root[959]: cut: /sysroot/etc/group: No such file or directory Dec 13 03:27:04.130943 systemd[1]: Starting ignition-mount.service... Dec 13 03:27:04.270562 initrd-setup-root[967]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 03:27:04.281527 ignition[1014]: INFO : Ignition 2.14.0 Dec 13 03:27:04.281527 ignition[1014]: INFO : Stage: mount Dec 13 03:27:04.281527 ignition[1014]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:27:04.281527 ignition[1014]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:27:04.281527 ignition[1014]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:27:04.281527 ignition[1014]: INFO : mount: mount passed Dec 13 03:27:04.281527 ignition[1014]: INFO : POST message to Packet Timeline Dec 13 03:27:04.281527 ignition[1014]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:27:04.156922 systemd[1]: Starting sysroot-boot.service... Dec 13 03:27:04.371645 initrd-setup-root[975]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 03:27:04.172228 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 03:27:04.172271 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 03:27:04.180121 systemd[1]: Finished sysroot-boot.service. Dec 13 03:27:04.914943 coreos-metadata[941]: Dec 13 03:27:04.914 INFO Fetch successful Dec 13 03:27:04.923631 coreos-metadata[940]: Dec 13 03:27:04.914 INFO Fetch successful Dec 13 03:27:04.989045 coreos-metadata[940]: Dec 13 03:27:04.989 INFO wrote hostname ci-3510.3.6-a-687f28f611 to /sysroot/etc/hostname Dec 13 03:27:04.989449 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 03:27:05.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.011666 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 03:27:05.107392 kernel: audit: type=1130 audit(1734060425.011:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.107407 kernel: audit: type=1130 audit(1734060425.076:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.107440 ignition[1014]: INFO : GET result: OK Dec 13 03:27:05.199597 kernel: audit: type=1131 audit(1734060425.076:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.011708 systemd[1]: Finished flatcar-static-network.service. Dec 13 03:27:05.452113 ignition[1014]: INFO : Ignition finished successfully Dec 13 03:27:05.453010 systemd[1]: Finished ignition-mount.service. Dec 13 03:27:05.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.470640 systemd[1]: Starting ignition-files.service... Dec 13 03:27:05.540541 kernel: audit: type=1130 audit(1734060425.469:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:05.535170 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:27:05.598680 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1030) Dec 13 03:27:05.598695 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:27:05.598702 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:27:05.622485 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:27:05.672346 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:27:05.674275 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:27:05.690492 ignition[1049]: INFO : Ignition 2.14.0 Dec 13 03:27:05.690492 ignition[1049]: INFO : Stage: files Dec 13 03:27:05.690492 ignition[1049]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:27:05.690492 ignition[1049]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:27:05.690492 ignition[1049]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:27:05.772529 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1057) Dec 13 03:27:05.694565 unknown[1049]: wrote ssh authorized keys file for user: core Dec 13 03:27:05.780451 ignition[1049]: DEBUG : files: compiled without relabeling support, skipping Dec 13 03:27:05.780451 ignition[1049]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 03:27:05.780451 ignition[1049]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 03:27:05.780451 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem389361540" Dec 13 03:27:06.045685 ignition[1049]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem389361540": device or resource busy Dec 13 03:27:06.045685 ignition[1049]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem389361540", trying btrfs: device or resource busy Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem389361540" Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem389361540" Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem389361540" Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem389361540" Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:27:06.045685 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(b): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 03:27:06.205579 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(b): GET result: OK Dec 13 03:27:06.522434 ignition[1049]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:27:06.522434 ignition[1049]: INFO : files: op(c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:27:06.522434 ignition[1049]: INFO : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:27:06.522434 ignition[1049]: INFO : files: op(d): [started] processing unit "packet-phone-home.service" Dec 13 03:27:06.522434 ignition[1049]: INFO : files: op(d): [finished] processing unit "packet-phone-home.service" Dec 13 03:27:06.522434 ignition[1049]: INFO : files: op(e): [started] processing unit "containerd.service" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(e): op(f): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(e): op(f): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(e): [finished] processing unit "containerd.service" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(10): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(10): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(11): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: op(11): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:27:06.600616 ignition[1049]: INFO : files: files passed Dec 13 03:27:06.600616 ignition[1049]: INFO : POST message to Packet Timeline Dec 13 03:27:06.600616 ignition[1049]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:27:07.506440 ignition[1049]: INFO : GET result: OK Dec 13 03:27:07.866134 ignition[1049]: INFO : Ignition finished successfully Dec 13 03:27:07.869211 systemd[1]: Finished ignition-files.service. Dec 13 03:27:07.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:07.889227 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 03:27:07.962626 kernel: audit: type=1130 audit(1734060427.883:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:07.951612 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 03:27:07.987535 initrd-setup-root-after-ignition[1083]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 03:27:07.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:07.952004 systemd[1]: Starting ignition-quench.service... Dec 13 03:27:08.178575 kernel: audit: type=1130 audit(1734060427.997:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.178592 kernel: audit: type=1130 audit(1734060428.065:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.178599 kernel: audit: type=1131 audit(1734060428.065:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:07.970791 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 03:27:07.997812 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 03:27:07.997883 systemd[1]: Finished ignition-quench.service. Dec 13 03:27:08.334339 kernel: audit: type=1130 audit(1734060428.220:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.334372 kernel: audit: type=1131 audit(1734060428.220:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.065624 systemd[1]: Reached target ignition-complete.target. Dec 13 03:27:08.187974 systemd[1]: Starting initrd-parse-etc.service... Dec 13 03:27:08.201622 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 03:27:08.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.201662 systemd[1]: Finished initrd-parse-etc.service. Dec 13 03:27:08.455577 kernel: audit: type=1130 audit(1734060428.383:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.220651 systemd[1]: Reached target initrd-fs.target. Dec 13 03:27:08.343575 systemd[1]: Reached target initrd.target. Dec 13 03:27:08.343633 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 03:27:08.343978 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 03:27:08.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.365689 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 03:27:08.590599 kernel: audit: type=1131 audit(1734060428.514:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.383929 systemd[1]: Starting initrd-cleanup.service... Dec 13 03:27:08.451307 systemd[1]: Stopped target nss-lookup.target. Dec 13 03:27:08.464608 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 03:27:08.480610 systemd[1]: Stopped target timers.target. Dec 13 03:27:08.494618 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 03:27:08.494721 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 03:27:08.514924 systemd[1]: Stopped target initrd.target. Dec 13 03:27:08.583667 systemd[1]: Stopped target basic.target. Dec 13 03:27:08.597613 systemd[1]: Stopped target ignition-complete.target. Dec 13 03:27:08.604661 systemd[1]: Stopped target ignition-diskful.target. Dec 13 03:27:08.628735 systemd[1]: Stopped target initrd-root-device.target. Dec 13 03:27:08.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.646661 systemd[1]: Stopped target remote-fs.target. Dec 13 03:27:08.847605 kernel: audit: type=1131 audit(1734060428.759:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.661737 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 03:27:08.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.679961 systemd[1]: Stopped target sysinit.target. Dec 13 03:27:08.932590 kernel: audit: type=1131 audit(1734060428.856:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.695952 systemd[1]: Stopped target local-fs.target. Dec 13 03:27:08.710926 systemd[1]: Stopped target local-fs-pre.target. Dec 13 03:27:08.727042 systemd[1]: Stopped target swap.target. Dec 13 03:27:08.742823 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 03:27:08.743201 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 03:27:09.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.760156 systemd[1]: Stopped target cryptsetup.target. Dec 13 03:27:09.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.839645 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 03:27:09.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.839729 systemd[1]: Stopped dracut-initqueue.service. Dec 13 03:27:09.056451 ignition[1098]: INFO : Ignition 2.14.0 Dec 13 03:27:09.056451 ignition[1098]: INFO : Stage: umount Dec 13 03:27:09.056451 ignition[1098]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:27:09.056451 ignition[1098]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:27:09.056451 ignition[1098]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:27:09.056451 ignition[1098]: INFO : umount: umount passed Dec 13 03:27:09.056451 ignition[1098]: INFO : POST message to Packet Timeline Dec 13 03:27:09.056451 ignition[1098]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:27:09.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:09.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:09.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:09.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:09.196030 iscsid[900]: iscsid shutting down. Dec 13 03:27:09.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:09.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.856655 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 03:27:09.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:08.856717 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 03:27:08.925764 systemd[1]: Stopped target paths.target. Dec 13 03:27:08.940598 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 03:27:08.944589 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 03:27:08.947667 systemd[1]: Stopped target slices.target. Dec 13 03:27:08.969730 systemd[1]: Stopped target sockets.target. Dec 13 03:27:08.984662 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 03:27:08.984789 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 03:27:09.003800 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 03:27:09.003986 systemd[1]: Stopped ignition-files.service. Dec 13 03:27:09.020043 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 03:27:09.020422 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 03:27:09.037104 systemd[1]: Stopping ignition-mount.service... Dec 13 03:27:09.049564 systemd[1]: Stopping iscsid.service... Dec 13 03:27:09.064010 systemd[1]: Stopping sysroot-boot.service... Dec 13 03:27:09.077599 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 03:27:09.078006 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 03:27:09.092933 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 03:27:09.093264 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 03:27:09.119577 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 03:27:09.121285 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 03:27:09.121543 systemd[1]: Stopped iscsid.service. Dec 13 03:27:09.138738 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 03:27:09.139028 systemd[1]: Closed iscsid.socket. Dec 13 03:27:09.156744 systemd[1]: Stopping iscsiuio.service... Dec 13 03:27:09.172066 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 03:27:09.172312 systemd[1]: Stopped iscsiuio.service. Dec 13 03:27:09.180407 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 03:27:09.180641 systemd[1]: Finished initrd-cleanup.service. Dec 13 03:27:09.204507 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 03:27:09.204724 systemd[1]: Stopped sysroot-boot.service. Dec 13 03:27:09.219812 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 03:27:09.219901 systemd[1]: Closed iscsiuio.socket. Dec 13 03:27:09.979297 ignition[1098]: INFO : GET result: OK Dec 13 03:27:10.307702 ignition[1098]: INFO : Ignition finished successfully Dec 13 03:27:10.310385 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 03:27:10.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.310632 systemd[1]: Stopped ignition-mount.service. Dec 13 03:27:10.325950 systemd[1]: Stopped target network.target. Dec 13 03:27:10.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.342562 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 03:27:10.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.342709 systemd[1]: Stopped ignition-disks.service. Dec 13 03:27:10.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.358674 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 03:27:10.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.358805 systemd[1]: Stopped ignition-kargs.service. Dec 13 03:27:10.373761 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 03:27:10.373915 systemd[1]: Stopped ignition-setup.service. Dec 13 03:27:10.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.392758 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 03:27:10.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.471000 audit: BPF prog-id=6 op=UNLOAD Dec 13 03:27:10.392910 systemd[1]: Stopped initrd-setup-root.service. Dec 13 03:27:10.408027 systemd[1]: Stopping systemd-networkd.service... Dec 13 03:27:10.413426 systemd-networkd[875]: enp1s0f1np1: DHCPv6 lease lost Dec 13 03:27:10.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.422542 systemd-networkd[875]: enp1s0f0np0: DHCPv6 lease lost Dec 13 03:27:10.526000 audit: BPF prog-id=9 op=UNLOAD Dec 13 03:27:10.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.422803 systemd[1]: Stopping systemd-resolved.service... Dec 13 03:27:10.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.438232 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 03:27:10.438495 systemd[1]: Stopped systemd-resolved.service. Dec 13 03:27:10.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.455945 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 03:27:10.456291 systemd[1]: Stopped systemd-networkd.service. Dec 13 03:27:10.470005 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 03:27:10.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.470096 systemd[1]: Closed systemd-networkd.socket. Dec 13 03:27:10.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.490472 systemd[1]: Stopping network-cleanup.service... Dec 13 03:27:10.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.502578 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 03:27:10.502733 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 03:27:10.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.518727 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 03:27:10.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.518863 systemd[1]: Stopped systemd-sysctl.service. Dec 13 03:27:10.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.534983 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 03:27:10.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.535127 systemd[1]: Stopped systemd-modules-load.service. Dec 13 03:27:10.552013 systemd[1]: Stopping systemd-udevd.service... Dec 13 03:27:10.570313 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 03:27:10.571523 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 03:27:10.571584 systemd[1]: Stopped systemd-udevd.service. Dec 13 03:27:10.576682 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 03:27:10.576712 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 03:27:10.597538 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 03:27:10.597564 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 03:27:10.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:10.614518 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 03:27:10.614570 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 03:27:10.630803 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 03:27:10.878000 audit: BPF prog-id=5 op=UNLOAD Dec 13 03:27:10.878000 audit: BPF prog-id=4 op=UNLOAD Dec 13 03:27:10.878000 audit: BPF prog-id=3 op=UNLOAD Dec 13 03:27:10.630929 systemd[1]: Stopped dracut-cmdline.service. Dec 13 03:27:10.884000 audit: BPF prog-id=8 op=UNLOAD Dec 13 03:27:10.884000 audit: BPF prog-id=7 op=UNLOAD Dec 13 03:27:10.647472 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 03:27:10.647515 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 03:27:10.663033 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 03:27:10.677450 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 03:27:10.677512 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 03:27:10.696877 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 03:27:10.696999 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 03:27:10.713583 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 03:27:10.713699 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 03:27:10.734108 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 03:27:10.735485 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 03:27:10.735699 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 03:27:10.823936 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 03:27:10.824168 systemd[1]: Stopped network-cleanup.service. Dec 13 03:27:10.836909 systemd[1]: Reached target initrd-switch-root.target. Dec 13 03:27:10.854241 systemd[1]: Starting initrd-switch-root.service... Dec 13 03:27:10.873622 systemd[1]: Switching root. Dec 13 03:27:10.942132 systemd-journald[267]: Journal stopped Dec 13 03:27:14.793880 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Dec 13 03:27:14.793894 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 03:27:14.793903 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 03:27:14.793909 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 03:27:14.793915 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 03:27:14.793920 kernel: SELinux: policy capability open_perms=1 Dec 13 03:27:14.793926 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 03:27:14.793932 kernel: SELinux: policy capability always_check_network=0 Dec 13 03:27:14.793938 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 03:27:14.793944 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 03:27:14.793949 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 03:27:14.793955 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 03:27:14.793963 systemd[1]: Successfully loaded SELinux policy in 316.737ms. Dec 13 03:27:14.793974 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.850ms. Dec 13 03:27:14.793984 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:27:14.793993 systemd[1]: Detected architecture x86-64. Dec 13 03:27:14.793999 systemd[1]: Detected first boot. Dec 13 03:27:14.794005 systemd[1]: Hostname set to <ci-3510.3.6-a-687f28f611>. Dec 13 03:27:14.794011 systemd[1]: Initializing machine ID from random generator. Dec 13 03:27:14.794017 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 03:27:14.794023 systemd[1]: Populated /etc with preset unit settings. Dec 13 03:27:14.794031 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:27:14.794037 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:27:14.794044 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:27:14.794051 systemd[1]: Queued start job for default target multi-user.target. Dec 13 03:27:14.794057 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 03:27:14.794063 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 03:27:14.794071 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 03:27:14.794077 systemd[1]: Created slice system-getty.slice. Dec 13 03:27:14.794084 systemd[1]: Created slice system-modprobe.slice. Dec 13 03:27:14.794090 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 03:27:14.794096 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 03:27:14.794103 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 03:27:14.794110 systemd[1]: Created slice user.slice. Dec 13 03:27:14.794121 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:27:14.794129 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 03:27:14.794137 systemd[1]: Set up automount boot.automount. Dec 13 03:27:14.794143 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 03:27:14.794151 systemd[1]: Reached target integritysetup.target. Dec 13 03:27:14.794159 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:27:14.794167 systemd[1]: Reached target remote-fs.target. Dec 13 03:27:14.794173 systemd[1]: Reached target slices.target. Dec 13 03:27:14.794179 systemd[1]: Reached target swap.target. Dec 13 03:27:14.794186 systemd[1]: Reached target torcx.target. Dec 13 03:27:14.794193 systemd[1]: Reached target veritysetup.target. Dec 13 03:27:14.794199 systemd[1]: Listening on systemd-coredump.socket. Dec 13 03:27:14.794205 systemd[1]: Listening on systemd-initctl.socket. Dec 13 03:27:14.794212 kernel: kauditd_printk_skb: 50 callbacks suppressed Dec 13 03:27:14.794218 kernel: audit: type=1400 audit(1734060434.038:93): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:27:14.794225 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 03:27:14.794231 kernel: audit: type=1335 audit(1734060434.038:94): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 03:27:14.794238 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 03:27:14.794244 systemd[1]: Listening on systemd-journald.socket. Dec 13 03:27:14.794251 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:27:14.794257 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:27:14.794263 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:27:14.794270 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 03:27:14.794283 systemd[1]: Mounting dev-hugepages.mount... Dec 13 03:27:14.794293 systemd[1]: Mounting dev-mqueue.mount... Dec 13 03:27:14.794304 systemd[1]: Mounting media.mount... Dec 13 03:27:14.794312 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:27:14.794318 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 03:27:14.794327 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 03:27:14.794334 systemd[1]: Mounting tmp.mount... Dec 13 03:27:14.794364 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 03:27:14.794373 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:27:14.794380 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:27:14.794387 systemd[1]: Starting modprobe@configfs.service... Dec 13 03:27:14.794408 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:27:14.794431 systemd[1]: Starting modprobe@drm.service... Dec 13 03:27:14.794438 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:27:14.794445 systemd[1]: Starting modprobe@fuse.service... Dec 13 03:27:14.794456 kernel: fuse: init (API version 7.34) Dec 13 03:27:14.794466 systemd[1]: Starting modprobe@loop.service... Dec 13 03:27:14.794474 kernel: loop: module loaded Dec 13 03:27:14.794483 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 03:27:14.794490 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 03:27:14.794497 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 03:27:14.794503 systemd[1]: Starting systemd-journald.service... Dec 13 03:27:14.794510 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:27:14.794516 kernel: audit: type=1305 audit(1734060434.791:95): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 03:27:14.794525 systemd-journald[1290]: Journal started Dec 13 03:27:14.794552 systemd-journald[1290]: Runtime Journal (/run/log/journal/d093707eb23642e08bb580818c1a0521) is 8.0M, max 640.1M, 632.1M free. Dec 13 03:27:14.038000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:27:14.038000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 03:27:14.791000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 03:27:14.791000 audit[1290]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe55db8080 a2=4000 a3=7ffe55db811c items=0 ppid=1 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:14.791000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 03:27:14.842413 kernel: audit: type=1300 audit(1734060434.791:95): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe55db8080 a2=4000 a3=7ffe55db811c items=0 ppid=1 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:14.842449 kernel: audit: type=1327 audit(1734060434.791:95): proctitle="/usr/lib/systemd/systemd-journald" Dec 13 03:27:14.957547 systemd[1]: Starting systemd-network-generator.service... Dec 13 03:27:14.984382 systemd[1]: Starting systemd-remount-fs.service... Dec 13 03:27:15.010380 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:27:15.053404 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:27:15.072403 systemd[1]: Started systemd-journald.service. Dec 13 03:27:15.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.081102 systemd[1]: Mounted dev-hugepages.mount. Dec 13 03:27:15.129430 kernel: audit: type=1130 audit(1734060435.080:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.135627 systemd[1]: Mounted dev-mqueue.mount. Dec 13 03:27:15.142611 systemd[1]: Mounted media.mount. Dec 13 03:27:15.149601 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 03:27:15.158587 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 03:27:15.167564 systemd[1]: Mounted tmp.mount. Dec 13 03:27:15.174698 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 03:27:15.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.183724 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:27:15.231388 kernel: audit: type=1130 audit(1734060435.183:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.239679 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 03:27:15.239755 systemd[1]: Finished modprobe@configfs.service. Dec 13 03:27:15.289525 kernel: audit: type=1130 audit(1734060435.239:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.297666 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:27:15.297738 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:27:15.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.348394 kernel: audit: type=1130 audit(1734060435.297:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.348430 kernel: audit: type=1131 audit(1734060435.297:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.408688 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:27:15.408762 systemd[1]: Finished modprobe@drm.service. Dec 13 03:27:15.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.417694 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:27:15.417767 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:27:15.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.426688 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 03:27:15.426761 systemd[1]: Finished modprobe@fuse.service. Dec 13 03:27:15.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.435675 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:27:15.435757 systemd[1]: Finished modprobe@loop.service. Dec 13 03:27:15.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.444728 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:27:15.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.453752 systemd[1]: Finished systemd-network-generator.service. Dec 13 03:27:15.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.462736 systemd[1]: Finished systemd-remount-fs.service. Dec 13 03:27:15.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.471816 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:27:15.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.480915 systemd[1]: Reached target network-pre.target. Dec 13 03:27:15.491391 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 03:27:15.501088 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 03:27:15.508576 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 03:27:15.509618 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 03:27:15.518080 systemd[1]: Starting systemd-journal-flush.service... Dec 13 03:27:15.521681 systemd-journald[1290]: Time spent on flushing to /var/log/journal/d093707eb23642e08bb580818c1a0521 is 13.930ms for 1514 entries. Dec 13 03:27:15.521681 systemd-journald[1290]: System Journal (/var/log/journal/d093707eb23642e08bb580818c1a0521) is 8.0M, max 195.6M, 187.6M free. Dec 13 03:27:15.569376 systemd-journald[1290]: Received client request to flush runtime journal. Dec 13 03:27:15.534442 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:27:15.534955 systemd[1]: Starting systemd-random-seed.service... Dec 13 03:27:15.552475 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:27:15.553056 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:27:15.560030 systemd[1]: Starting systemd-sysusers.service... Dec 13 03:27:15.567005 systemd[1]: Starting systemd-udev-settle.service... Dec 13 03:27:15.574678 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 03:27:15.582502 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 03:27:15.590643 systemd[1]: Finished systemd-journal-flush.service. Dec 13 03:27:15.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.598641 systemd[1]: Finished systemd-random-seed.service. Dec 13 03:27:15.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.606594 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:27:15.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.614567 systemd[1]: Finished systemd-sysusers.service. Dec 13 03:27:15.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.623518 systemd[1]: Reached target first-boot-complete.target. Dec 13 03:27:15.632134 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:27:15.641633 udevadm[1315]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 03:27:15.650006 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:27:15.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.813894 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 03:27:15.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.823307 systemd[1]: Starting systemd-udevd.service... Dec 13 03:27:15.834883 systemd-udevd[1324]: Using default interface naming scheme 'v252'. Dec 13 03:27:15.853525 systemd[1]: Started systemd-udevd.service. Dec 13 03:27:15.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:15.865103 systemd[1]: Found device dev-ttyS1.device. Dec 13 03:27:15.892119 systemd[1]: Starting systemd-networkd.service... Dec 13 03:27:15.913300 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 03:27:15.913370 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 03:27:15.913395 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1377) Dec 13 03:27:15.922365 systemd[1]: Starting systemd-userdbd.service... Dec 13 03:27:15.940348 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 03:27:15.963350 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 03:27:15.980634 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Dec 13 03:27:15.986348 kernel: ACPI: button: Power Button [PWRF] Dec 13 03:27:15.894000 audit[1390]: AVC avc: denied { confidentiality } for pid=1390 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:27:15.894000 audit[1390]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7faeac74b010 a1=4d98c a2=7faeae406bc5 a3=5 items=42 ppid=1324 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:15.894000 audit: CWD cwd="/" Dec 13 03:27:15.894000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=1 name=(null) inode=29021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=2 name=(null) inode=29021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=3 name=(null) inode=29022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=4 name=(null) inode=29021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=5 name=(null) inode=29023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=6 name=(null) inode=29021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=7 name=(null) inode=29024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=8 name=(null) inode=29024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:16.034390 kernel: IPMI message handler: version 39.2 Dec 13 03:27:15.894000 audit: PATH item=9 name=(null) inode=29025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=10 name=(null) inode=29024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=11 name=(null) inode=29026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=12 name=(null) inode=29024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=13 name=(null) inode=29027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=14 name=(null) inode=29024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=15 name=(null) inode=29028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=16 name=(null) inode=29024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=17 name=(null) inode=29029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=18 name=(null) inode=29021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=19 name=(null) inode=29030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=20 name=(null) inode=29030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=21 name=(null) inode=29031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=22 name=(null) inode=29030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=23 name=(null) inode=29032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=24 name=(null) inode=29030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=25 name=(null) inode=29033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=26 name=(null) inode=29030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=27 name=(null) inode=29034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=28 name=(null) inode=29030 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=29 name=(null) inode=29035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=30 name=(null) inode=29021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=31 name=(null) inode=29036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=32 name=(null) inode=29036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=33 name=(null) inode=29037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=34 name=(null) inode=29036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=35 name=(null) inode=29038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=36 name=(null) inode=29036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=37 name=(null) inode=29039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=38 name=(null) inode=29036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=39 name=(null) inode=29040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=40 name=(null) inode=29036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PATH item=41 name=(null) inode=29041 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:15.894000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 03:27:16.043689 systemd[1]: Started systemd-userdbd.service. Dec 13 03:27:16.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:16.074354 kernel: ipmi device interface Dec 13 03:27:16.074421 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 03:27:16.141230 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 03:27:16.141495 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Dec 13 03:27:16.141701 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 03:27:16.162158 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 03:27:16.316909 kernel: ipmi_si: IPMI System Interface driver Dec 13 03:27:16.316924 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 03:27:16.316999 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 03:27:16.317020 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 03:27:16.317039 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 03:27:16.383595 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 03:27:16.383683 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 03:27:16.383744 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 03:27:16.383755 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 03:27:16.409348 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 03:27:16.475347 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 03:27:16.479477 systemd-networkd[1404]: bond0: netdev ready Dec 13 03:27:16.482303 systemd-networkd[1404]: lo: Link UP Dec 13 03:27:16.482306 systemd-networkd[1404]: lo: Gained carrier Dec 13 03:27:16.482782 systemd-networkd[1404]: Enumeration completed Dec 13 03:27:16.482891 systemd[1]: Started systemd-networkd.service. Dec 13 03:27:16.483071 systemd-networkd[1404]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 03:27:16.489647 systemd-networkd[1404]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:d5:7d.network. Dec 13 03:27:16.504384 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 03:27:16.551385 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 03:27:16.551487 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 03:27:16.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:16.596271 kernel: intel_rapl_common: Found RAPL domain package Dec 13 03:27:16.596314 kernel: intel_rapl_common: Found RAPL domain core Dec 13 03:27:16.596333 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 03:27:16.596421 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 03:27:16.657346 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 03:27:16.677643 systemd[1]: Finished systemd-udev-settle.service. Dec 13 03:27:16.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:16.686158 systemd[1]: Starting lvm2-activation-early.service... Dec 13 03:27:16.702646 lvm[1432]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:27:16.738795 systemd[1]: Finished lvm2-activation-early.service. Dec 13 03:27:16.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:16.748503 systemd[1]: Reached target cryptsetup.target. Dec 13 03:27:16.758028 systemd[1]: Starting lvm2-activation.service... Dec 13 03:27:16.760420 lvm[1434]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:27:16.796816 systemd[1]: Finished lvm2-activation.service. Dec 13 03:27:16.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:16.805566 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:27:16.814382 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 03:27:16.814394 systemd[1]: Reached target local-fs.target. Dec 13 03:27:16.823386 systemd[1]: Reached target machines.target. Dec 13 03:27:16.833122 systemd[1]: Starting ldconfig.service... Dec 13 03:27:16.839883 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:27:16.839905 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:27:16.840477 systemd[1]: Starting systemd-boot-update.service... Dec 13 03:27:16.847845 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 03:27:16.858111 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 03:27:16.859003 systemd[1]: Starting systemd-sysext.service... Dec 13 03:27:16.859227 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1440 (bootctl) Dec 13 03:27:16.859907 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 03:27:16.879465 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 03:27:16.880052 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 03:27:16.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:16.881686 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 03:27:16.881807 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 03:27:16.919376 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 03:27:17.003854 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 03:27:17.004242 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 03:27:17.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.040388 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 03:27:17.053506 systemd-fsck[1452]: fsck.fat 4.2 (2021-01-31) Dec 13 03:27:17.053506 systemd-fsck[1452]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 03:27:17.054228 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 03:27:17.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.072774 systemd[1]: Mounting boot.mount... Dec 13 03:27:17.078403 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:27:17.105354 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 03:27:17.105366 systemd-networkd[1404]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:d5:7c.network. Dec 13 03:27:17.107495 systemd[1]: Mounted boot.mount. Dec 13 03:27:17.129389 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:27:17.129422 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 03:27:17.165930 (sd-sysext)[1460]: Using extensions 'kubernetes'. Dec 13 03:27:17.166115 (sd-sysext)[1460]: Merged extensions into '/usr'. Dec 13 03:27:17.167644 systemd[1]: Finished systemd-boot-update.service. Dec 13 03:27:17.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.182267 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:27:17.183176 systemd[1]: Mounting usr-share-oem.mount... Dec 13 03:27:17.190526 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.191208 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:27:17.202092 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:27:17.212593 systemd[1]: Starting modprobe@loop.service... Dec 13 03:27:17.225150 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.225636 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:27:17.226089 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:27:17.235074 systemd[1]: Mounted usr-share-oem.mount. Dec 13 03:27:17.257351 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:27:17.257410 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 03:27:17.291654 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:27:17.291739 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:27:17.301069 ldconfig[1439]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 03:27:17.301344 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 03:27:17.301368 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 03:27:17.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.317094 systemd[1]: Finished ldconfig.service. Dec 13 03:27:17.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.337649 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:27:17.337729 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:27:17.343352 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 03:27:17.343382 kernel: bond0: active interface up! Dec 13 03:27:17.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.376582 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:27:17.376670 systemd[1]: Finished modprobe@loop.service. Dec 13 03:27:17.382402 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Dec 13 03:27:17.382518 systemd-networkd[1404]: bond0: Link UP Dec 13 03:27:17.382729 systemd-networkd[1404]: enp1s0f1np1: Link UP Dec 13 03:27:17.382863 systemd-networkd[1404]: enp1s0f1np1: Gained carrier Dec 13 03:27:17.383851 systemd-networkd[1404]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:d5:7c.network. Dec 13 03:27:17.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.391642 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:27:17.391703 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.392218 systemd[1]: Finished systemd-sysext.service. Dec 13 03:27:17.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.402110 systemd[1]: Starting ensure-sysext.service... Dec 13 03:27:17.409907 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 03:27:17.415623 systemd-tmpfiles[1476]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 03:27:17.416903 systemd-tmpfiles[1476]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 03:27:17.417956 systemd-tmpfiles[1476]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 03:27:17.420566 systemd[1]: Reloading. Dec 13 03:27:17.442438 /usr/lib/systemd/system-generators/torcx-generator[1495]: time="2024-12-13T03:27:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:27:17.442460 /usr/lib/systemd/system-generators/torcx-generator[1495]: time="2024-12-13T03:27:17Z" level=info msg="torcx already run" Dec 13 03:27:17.467082 systemd-networkd[1404]: enp1s0f0np0: Link UP Dec 13 03:27:17.467312 systemd-networkd[1404]: bond0: Gained carrier Dec 13 03:27:17.467423 systemd-networkd[1404]: enp1s0f0np0: Gained carrier Dec 13 03:27:17.480738 systemd-networkd[1404]: enp1s0f1np1: Link DOWN Dec 13 03:27:17.480742 systemd-networkd[1404]: enp1s0f1np1: Lost carrier Dec 13 03:27:17.501219 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:27:17.501226 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:27:17.511411 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.514285 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:27:17.534389 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.556396 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.572520 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 03:27:17.577406 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:17.597478 systemd[1]: Starting audit-rules.service... Dec 13 03:27:17.599395 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.612000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 03:27:17.612000 audit[1580]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe89f29f50 a2=420 a3=0 items=0 ppid=1565 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:17.612000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 03:27:17.613323 augenrules[1580]: No rules Dec 13 03:27:17.615972 systemd[1]: Starting clean-ca-certificates.service... Dec 13 03:27:17.621409 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.639099 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 03:27:17.642378 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.642398 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:27:17.657347 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:27:17.661688 systemd-networkd[1404]: enp1s0f1np1: Link UP Dec 13 03:27:17.661850 systemd-networkd[1404]: enp1s0f1np1: Gained carrier Dec 13 03:27:17.676345 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 03:27:17.702293 systemd[1]: Starting systemd-resolved.service... Dec 13 03:27:17.710226 systemd[1]: Starting systemd-timesyncd.service... Dec 13 03:27:17.718028 systemd[1]: Starting systemd-update-utmp.service... Dec 13 03:27:17.724969 systemd[1]: Finished audit-rules.service. Dec 13 03:27:17.731698 systemd[1]: Finished clean-ca-certificates.service. Dec 13 03:27:17.740640 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 03:27:17.754059 systemd[1]: Finished systemd-update-utmp.service. Dec 13 03:27:17.763030 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.763657 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:27:17.771005 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:27:17.777942 systemd[1]: Starting modprobe@loop.service... Dec 13 03:27:17.795346 kernel: bond0: (slave enp1s0f1np1): link status up again after 100 ms Dec 13 03:27:17.810441 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.810513 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:27:17.811247 systemd[1]: Starting systemd-update-done.service... Dec 13 03:27:17.815345 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 03:27:17.821032 systemd-resolved[1590]: Positive Trust Anchors: Dec 13 03:27:17.821039 systemd-resolved[1590]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:27:17.821058 systemd-resolved[1590]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:27:17.822400 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:27:17.822978 systemd[1]: Started systemd-timesyncd.service. Dec 13 03:27:17.825298 systemd-resolved[1590]: Using system hostname 'ci-3510.3.6-a-687f28f611'. Dec 13 03:27:17.832597 systemd[1]: Started systemd-resolved.service. Dec 13 03:27:17.841635 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:27:17.841721 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:27:17.850624 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:27:17.850700 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:27:17.858612 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:27:17.858689 systemd[1]: Finished modprobe@loop.service. Dec 13 03:27:17.866657 systemd[1]: Finished systemd-update-done.service. Dec 13 03:27:17.875741 systemd[1]: Reached target network.target. Dec 13 03:27:17.883468 systemd[1]: Reached target nss-lookup.target. Dec 13 03:27:17.891456 systemd[1]: Reached target time-set.target. Dec 13 03:27:17.899588 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.900253 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:27:17.907988 systemd[1]: Starting modprobe@drm.service... Dec 13 03:27:17.914961 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:27:17.921940 systemd[1]: Starting modprobe@loop.service... Dec 13 03:27:17.928472 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:27:17.928540 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:27:17.929172 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 03:27:17.937441 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:27:17.939273 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:27:17.939352 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:27:17.947619 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:27:17.947692 systemd[1]: Finished modprobe@drm.service. Dec 13 03:27:17.955636 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:27:17.955708 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:27:17.963598 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:27:17.963677 systemd[1]: Finished modprobe@loop.service. Dec 13 03:27:17.971709 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:27:17.971757 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:27:17.971827 systemd[1]: Reached target sysinit.target. Dec 13 03:27:17.980475 systemd[1]: Started motdgen.path. Dec 13 03:27:17.987446 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 03:27:17.997495 systemd[1]: Started logrotate.timer. Dec 13 03:27:18.004466 systemd[1]: Started mdadm.timer. Dec 13 03:27:18.011417 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 03:27:18.019588 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:27:18.019674 systemd[1]: Reached target paths.target. Dec 13 03:27:18.026425 systemd[1]: Reached target timers.target. Dec 13 03:27:18.033560 systemd[1]: Listening on dbus.socket. Dec 13 03:27:18.041021 systemd[1]: Starting docker.socket... Dec 13 03:27:18.048215 systemd[1]: Listening on sshd.socket. Dec 13 03:27:18.055486 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:27:18.055511 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:27:18.055523 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:27:18.055820 systemd[1]: Finished ensure-sysext.service. Dec 13 03:27:18.064487 systemd[1]: Listening on docker.socket. Dec 13 03:27:18.071825 systemd[1]: Reached target sockets.target. Dec 13 03:27:18.080420 systemd[1]: Reached target basic.target. Dec 13 03:27:18.087492 systemd[1]: System is tainted: cgroupsv1 Dec 13 03:27:18.087516 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:27:18.087530 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:27:18.088030 systemd[1]: Starting containerd.service... Dec 13 03:27:18.094888 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 03:27:18.103996 systemd[1]: Starting coreos-metadata.service... Dec 13 03:27:18.110973 systemd[1]: Starting dbus.service... Dec 13 03:27:18.117018 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 03:27:18.121873 jq[1626]: false Dec 13 03:27:18.124003 systemd[1]: Starting extend-filesystems.service... Dec 13 03:27:18.124425 coreos-metadata[1619]: Dec 13 03:27:18.124 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:27:18.130444 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 03:27:18.131061 dbus-daemon[1625]: [system] SELinux support is enabled Dec 13 03:27:18.131360 systemd[1]: Starting motdgen.service... Dec 13 03:27:18.133174 extend-filesystems[1628]: Found loop1 Dec 13 03:27:18.133174 extend-filesystems[1628]: Found sda Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda1 Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda2 Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda3 Dec 13 03:27:18.160875 extend-filesystems[1628]: Found usr Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda4 Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda6 Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda7 Dec 13 03:27:18.160875 extend-filesystems[1628]: Found sda9 Dec 13 03:27:18.160875 extend-filesystems[1628]: Checking size of /dev/sda9 Dec 13 03:27:18.160875 extend-filesystems[1628]: Resized partition /dev/sda9 Dec 13 03:27:18.291394 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Dec 13 03:27:18.291430 coreos-metadata[1622]: Dec 13 03:27:18.135 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:27:18.139319 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 03:27:18.291654 extend-filesystems[1645]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 03:27:18.174228 systemd[1]: Starting sshd-keygen.service... Dec 13 03:27:18.302568 dbus-daemon[1625]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 03:27:18.188538 systemd[1]: Starting systemd-logind.service... Dec 13 03:27:18.201499 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:27:18.202115 systemd[1]: Starting tcsd.service... Dec 13 03:27:18.307895 update_engine[1658]: I1213 03:27:18.257778 1658 main.cc:92] Flatcar Update Engine starting Dec 13 03:27:18.307895 update_engine[1658]: I1213 03:27:18.260926 1658 update_check_scheduler.cc:74] Next update check in 6m9s Dec 13 03:27:18.215039 systemd[1]: Starting update-engine.service... Dec 13 03:27:18.308180 jq[1659]: true Dec 13 03:27:18.218772 systemd-logind[1656]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 03:27:18.218783 systemd-logind[1656]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 03:27:18.308569 jq[1663]: true Dec 13 03:27:18.218792 systemd-logind[1656]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 03:27:18.218893 systemd-logind[1656]: New seat seat0. Dec 13 03:27:18.229117 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 03:27:18.248815 systemd[1]: Started dbus.service. Dec 13 03:27:18.258240 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 03:27:18.258379 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 03:27:18.258524 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 03:27:18.258629 systemd[1]: Finished motdgen.service. Dec 13 03:27:18.282593 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 03:27:18.282707 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 03:27:18.306648 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 03:27:18.306774 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 03:27:18.310698 systemd[1]: Started systemd-logind.service. Dec 13 03:27:18.311308 env[1664]: time="2024-12-13T03:27:18.311288053Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 03:27:18.319611 env[1664]: time="2024-12-13T03:27:18.319571220Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 03:27:18.320663 env[1664]: time="2024-12-13T03:27:18.320600826Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:27:18.321222 env[1664]: time="2024-12-13T03:27:18.321206817Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:27:18.321222 env[1664]: time="2024-12-13T03:27:18.321222054Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:27:18.323179 env[1664]: time="2024-12-13T03:27:18.323163222Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:27:18.323179 env[1664]: time="2024-12-13T03:27:18.323175788Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 03:27:18.323223 env[1664]: time="2024-12-13T03:27:18.323183725Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 03:27:18.323223 env[1664]: time="2024-12-13T03:27:18.323193357Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 03:27:18.323259 env[1664]: time="2024-12-13T03:27:18.323249400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:27:18.323463 systemd[1]: Started update-engine.service. Dec 13 03:27:18.325630 env[1664]: time="2024-12-13T03:27:18.325581422Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:27:18.325716 env[1664]: time="2024-12-13T03:27:18.325680711Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:27:18.325716 env[1664]: time="2024-12-13T03:27:18.325691127Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 03:27:18.325761 env[1664]: time="2024-12-13T03:27:18.325718502Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 03:27:18.325761 env[1664]: time="2024-12-13T03:27:18.325725927Z" level=info msg="metadata content store policy set" policy=shared Dec 13 03:27:18.330420 bash[1694]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:27:18.332569 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 03:27:18.335257 env[1664]: time="2024-12-13T03:27:18.335221154Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 03:27:18.335257 env[1664]: time="2024-12-13T03:27:18.335236949Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 03:27:18.335257 env[1664]: time="2024-12-13T03:27:18.335244825Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335260281Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335268913Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335276124Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335283035Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335293738Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335301758Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335309437Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335316309Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335323571Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 03:27:18.335385 env[1664]: time="2024-12-13T03:27:18.335374121Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 03:27:18.335530 env[1664]: time="2024-12-13T03:27:18.335419405Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 03:27:18.335620 env[1664]: time="2024-12-13T03:27:18.335582011Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 03:27:18.335620 env[1664]: time="2024-12-13T03:27:18.335598093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335620 env[1664]: time="2024-12-13T03:27:18.335605959Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335632895Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335640741Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335647464Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335653541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335662860Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335669956Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335676395Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335685 env[1664]: time="2024-12-13T03:27:18.335682470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335689419Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335750138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335758878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335765751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335771892Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335779620Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335785689Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 03:27:18.335800 env[1664]: time="2024-12-13T03:27:18.335795196Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 03:27:18.335916 env[1664]: time="2024-12-13T03:27:18.335815663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 03:27:18.335978 env[1664]: time="2024-12-13T03:27:18.335922595Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 03:27:18.335978 env[1664]: time="2024-12-13T03:27:18.335954243Z" level=info msg="Connect containerd service" Dec 13 03:27:18.335978 env[1664]: time="2024-12-13T03:27:18.335973001Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336353773Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336452772Z" level=info msg="Start subscribing containerd event" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336489013Z" level=info msg="Start recovering state" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336697052Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336729476Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336731421Z" level=info msg="Start event monitor" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336745604Z" level=info msg="Start snapshots syncer" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336753270Z" level=info msg="Start cni network conf syncer for default" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336760561Z" level=info msg="Start streaming server" Dec 13 03:27:18.338955 env[1664]: time="2024-12-13T03:27:18.336762752Z" level=info msg="containerd successfully booted in 0.025813s" Dec 13 03:27:18.342560 systemd[1]: Started containerd.service. Dec 13 03:27:18.350916 systemd[1]: Started locksmithd.service. Dec 13 03:27:18.358456 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 03:27:18.358540 systemd[1]: Reached target system-config.target. Dec 13 03:27:18.367419 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 03:27:18.367485 systemd[1]: Reached target user-config.target. Dec 13 03:27:18.408556 locksmithd[1702]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 03:27:18.501632 sshd_keygen[1655]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 03:27:18.513673 systemd[1]: Finished sshd-keygen.service. Dec 13 03:27:18.521499 systemd[1]: Starting issuegen.service... Dec 13 03:27:18.529629 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 03:27:18.529733 systemd[1]: Finished issuegen.service. Dec 13 03:27:18.538273 systemd[1]: Starting systemd-user-sessions.service... Dec 13 03:27:18.546649 systemd[1]: Finished systemd-user-sessions.service. Dec 13 03:27:18.555087 systemd[1]: Started getty@tty1.service. Dec 13 03:27:18.562079 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 03:27:18.570468 systemd[1]: Reached target getty.target. Dec 13 03:27:18.663376 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Dec 13 03:27:18.700679 extend-filesystems[1645]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 03:27:18.700679 extend-filesystems[1645]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 03:27:18.700679 extend-filesystems[1645]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Dec 13 03:27:18.739426 extend-filesystems[1628]: Resized filesystem in /dev/sda9 Dec 13 03:27:18.739426 extend-filesystems[1628]: Found sdb Dec 13 03:27:18.703281 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 03:27:18.704794 systemd[1]: Finished extend-filesystems.service. Dec 13 03:27:19.073437 systemd-networkd[1404]: bond0: Gained IPv6LL Dec 13 03:27:19.074522 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 03:27:19.084642 systemd[1]: Reached target network-online.target. Dec 13 03:27:19.093402 systemd[1]: Starting kubelet.service... Dec 13 03:27:19.762073 systemd[1]: Started kubelet.service. Dec 13 03:27:19.980417 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 03:27:20.434367 kubelet[1737]: E1213 03:27:20.434329 1737 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:27:20.435661 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:27:20.435742 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:27:23.584006 login[1725]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 03:27:23.592232 login[1724]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 03:27:23.592584 systemd-logind[1656]: New session 1 of user core. Dec 13 03:27:23.593240 systemd[1]: Created slice user-500.slice. Dec 13 03:27:23.593785 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 03:27:23.594918 systemd-logind[1656]: New session 2 of user core. Dec 13 03:27:23.599522 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 03:27:23.600220 systemd[1]: Starting user@500.service... Dec 13 03:27:23.602178 (systemd)[1763]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:23.673000 systemd[1763]: Queued start job for default target default.target. Dec 13 03:27:23.673101 systemd[1763]: Reached target paths.target. Dec 13 03:27:23.673111 systemd[1763]: Reached target sockets.target. Dec 13 03:27:23.673119 systemd[1763]: Reached target timers.target. Dec 13 03:27:23.673126 systemd[1763]: Reached target basic.target. Dec 13 03:27:23.673145 systemd[1763]: Reached target default.target. Dec 13 03:27:23.673158 systemd[1763]: Startup finished in 67ms. Dec 13 03:27:23.673224 systemd[1]: Started user@500.service. Dec 13 03:27:23.673745 systemd[1]: Started session-1.scope. Dec 13 03:27:23.674054 systemd[1]: Started session-2.scope. Dec 13 03:27:24.002511 coreos-metadata[1619]: Dec 13 03:27:24.002 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 03:27:24.003398 coreos-metadata[1622]: Dec 13 03:27:24.002 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 03:27:25.002846 coreos-metadata[1622]: Dec 13 03:27:25.002 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 03:27:25.003106 coreos-metadata[1619]: Dec 13 03:27:25.002 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 03:27:25.423670 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 03:27:25.423833 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 03:27:26.165628 coreos-metadata[1619]: Dec 13 03:27:26.165 INFO Fetch successful Dec 13 03:27:26.206095 unknown[1619]: wrote ssh authorized keys file for user: core Dec 13 03:27:26.240555 update-ssh-keys[1786]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:27:26.240823 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 03:27:26.252918 systemd-timesyncd[1591]: Contacted time server 23.150.41.122:123 (0.flatcar.pool.ntp.org). Dec 13 03:27:26.252950 systemd-timesyncd[1591]: Initial clock synchronization to Fri 2024-12-13 03:27:26.027438 UTC. Dec 13 03:27:26.280500 systemd[1]: Created slice system-sshd.slice. Dec 13 03:27:26.281714 systemd[1]: Started sshd@0-147.75.202.71:22-139.178.68.195:47654.service. Dec 13 03:27:26.383417 sshd[1789]: Accepted publickey for core from 139.178.68.195 port 47654 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:26.384926 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:26.389218 systemd-logind[1656]: New session 3 of user core. Dec 13 03:27:26.390239 systemd[1]: Started session-3.scope. Dec 13 03:27:26.444874 systemd[1]: Started sshd@1-147.75.202.71:22-139.178.68.195:41976.service. Dec 13 03:27:26.477558 sshd[1794]: Accepted publickey for core from 139.178.68.195 port 41976 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:26.478258 sshd[1794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:26.480728 systemd-logind[1656]: New session 4 of user core. Dec 13 03:27:26.481174 systemd[1]: Started session-4.scope. Dec 13 03:27:26.532183 sshd[1794]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:26.534525 systemd[1]: Started sshd@2-147.75.202.71:22-139.178.68.195:41982.service. Dec 13 03:27:26.535164 systemd[1]: sshd@1-147.75.202.71:22-139.178.68.195:41976.service: Deactivated successfully. Dec 13 03:27:26.536110 systemd-logind[1656]: Session 4 logged out. Waiting for processes to exit. Dec 13 03:27:26.536143 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 03:27:26.537273 systemd-logind[1656]: Removed session 4. Dec 13 03:27:26.576654 sshd[1800]: Accepted publickey for core from 139.178.68.195 port 41982 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:26.577400 sshd[1800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:26.579940 systemd-logind[1656]: New session 5 of user core. Dec 13 03:27:26.580374 systemd[1]: Started session-5.scope. Dec 13 03:27:26.634783 sshd[1800]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:26.637951 systemd[1]: sshd@2-147.75.202.71:22-139.178.68.195:41982.service: Deactivated successfully. Dec 13 03:27:26.639494 systemd-logind[1656]: Session 5 logged out. Waiting for processes to exit. Dec 13 03:27:26.639653 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 03:27:26.641241 systemd-logind[1656]: Removed session 5. Dec 13 03:27:26.917982 coreos-metadata[1622]: Dec 13 03:27:26.917 INFO Fetch successful Dec 13 03:27:26.997998 systemd[1]: Finished coreos-metadata.service. Dec 13 03:27:26.998914 systemd[1]: Started packet-phone-home.service. Dec 13 03:27:26.999033 systemd[1]: Reached target multi-user.target. Dec 13 03:27:26.999717 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 03:27:27.003600 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 03:27:27.003734 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 03:27:27.003902 curl[1813]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 03:27:27.004049 curl[1813]: Dload Upload Total Spent Left Speed Dec 13 03:27:27.003912 systemd[1]: Startup finished in 24.145s (kernel) + 15.877s (userspace) = 40.022s. Dec 13 03:27:27.359076 curl[1813]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 03:27:27.361365 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 03:27:30.513376 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 03:27:30.513878 systemd[1]: Stopped kubelet.service. Dec 13 03:27:30.516113 systemd[1]: Starting kubelet.service... Dec 13 03:27:30.722093 systemd[1]: Started kubelet.service. Dec 13 03:27:30.757930 kubelet[1825]: E1213 03:27:30.757850 1825 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:27:30.760024 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:27:30.760123 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:27:36.476205 systemd[1]: Started sshd@3-147.75.202.71:22-139.178.68.195:58154.service. Dec 13 03:27:36.509481 sshd[1846]: Accepted publickey for core from 139.178.68.195 port 58154 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:36.510147 sshd[1846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:36.512752 systemd-logind[1656]: New session 6 of user core. Dec 13 03:27:36.513231 systemd[1]: Started session-6.scope. Dec 13 03:27:36.564232 sshd[1846]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:36.565616 systemd[1]: Started sshd@4-147.75.202.71:22-139.178.68.195:58164.service. Dec 13 03:27:36.565966 systemd[1]: sshd@3-147.75.202.71:22-139.178.68.195:58154.service: Deactivated successfully. Dec 13 03:27:36.566426 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 03:27:36.566478 systemd-logind[1656]: Session 6 logged out. Waiting for processes to exit. Dec 13 03:27:36.566981 systemd-logind[1656]: Removed session 6. Dec 13 03:27:36.599134 sshd[1851]: Accepted publickey for core from 139.178.68.195 port 58164 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:36.599941 sshd[1851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:36.602704 systemd-logind[1656]: New session 7 of user core. Dec 13 03:27:36.603215 systemd[1]: Started session-7.scope. Dec 13 03:27:36.653161 sshd[1851]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:36.657635 systemd[1]: Started sshd@5-147.75.202.71:22-139.178.68.195:58174.service. Dec 13 03:27:36.659257 systemd[1]: sshd@4-147.75.202.71:22-139.178.68.195:58164.service: Deactivated successfully. Dec 13 03:27:36.661545 systemd-logind[1656]: Session 7 logged out. Waiting for processes to exit. Dec 13 03:27:36.661793 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 03:27:36.663879 systemd-logind[1656]: Removed session 7. Dec 13 03:27:36.718434 sshd[1858]: Accepted publickey for core from 139.178.68.195 port 58174 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:36.719111 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:36.721344 systemd-logind[1656]: New session 8 of user core. Dec 13 03:27:36.721796 systemd[1]: Started session-8.scope. Dec 13 03:27:36.773422 sshd[1858]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:36.776006 systemd[1]: Started sshd@6-147.75.202.71:22-139.178.68.195:58188.service. Dec 13 03:27:36.776735 systemd[1]: sshd@5-147.75.202.71:22-139.178.68.195:58174.service: Deactivated successfully. Dec 13 03:27:36.777956 systemd-logind[1656]: Session 8 logged out. Waiting for processes to exit. Dec 13 03:27:36.778013 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 03:27:36.779249 systemd-logind[1656]: Removed session 8. Dec 13 03:27:36.837147 sshd[1865]: Accepted publickey for core from 139.178.68.195 port 58188 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:36.838650 sshd[1865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:36.843510 systemd-logind[1656]: New session 9 of user core. Dec 13 03:27:36.844652 systemd[1]: Started session-9.scope. Dec 13 03:27:36.928718 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 03:27:36.929411 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:27:36.946748 dbus-daemon[1625]: \xd0\u001d̋\xf0U: received setenforce notice (enforcing=478123248) Dec 13 03:27:36.951681 sudo[1871]: pam_unix(sudo:session): session closed for user root Dec 13 03:27:36.956767 sshd[1865]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:36.963151 systemd[1]: Started sshd@7-147.75.202.71:22-139.178.68.195:58196.service. Dec 13 03:27:36.965137 systemd[1]: sshd@6-147.75.202.71:22-139.178.68.195:58188.service: Deactivated successfully. Dec 13 03:27:36.967815 systemd-logind[1656]: Session 9 logged out. Waiting for processes to exit. Dec 13 03:27:36.967868 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 03:27:36.970667 systemd-logind[1656]: Removed session 9. Dec 13 03:27:37.065362 sshd[1873]: Accepted publickey for core from 139.178.68.195 port 58196 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:37.066466 sshd[1873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:37.070251 systemd-logind[1656]: New session 10 of user core. Dec 13 03:27:37.071086 systemd[1]: Started session-10.scope. Dec 13 03:27:37.130156 sudo[1880]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 03:27:37.130277 sudo[1880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:27:37.132016 sudo[1880]: pam_unix(sudo:session): session closed for user root Dec 13 03:27:37.134376 sudo[1879]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 03:27:37.134499 sudo[1879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:27:37.139747 systemd[1]: Stopping audit-rules.service... Dec 13 03:27:37.139000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:27:37.140752 auditctl[1883]: No rules Dec 13 03:27:37.140945 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 03:27:37.141085 systemd[1]: Stopped audit-rules.service. Dec 13 03:27:37.141959 systemd[1]: Starting audit-rules.service... Dec 13 03:27:37.146022 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 03:27:37.146054 kernel: audit: type=1305 audit(1734060457.139:142): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:27:37.151817 augenrules[1901]: No rules Dec 13 03:27:37.152117 systemd[1]: Finished audit-rules.service. Dec 13 03:27:37.152571 sudo[1879]: pam_unix(sudo:session): session closed for user root Dec 13 03:27:37.153289 sshd[1873]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:37.154821 systemd[1]: Started sshd@8-147.75.202.71:22-139.178.68.195:58198.service. Dec 13 03:27:37.155235 systemd[1]: sshd@7-147.75.202.71:22-139.178.68.195:58196.service: Deactivated successfully. Dec 13 03:27:37.155769 systemd-logind[1656]: Session 10 logged out. Waiting for processes to exit. Dec 13 03:27:37.155801 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 03:27:37.156329 systemd-logind[1656]: Removed session 10. Dec 13 03:27:37.139000 audit[1883]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0c7194a0 a2=420 a3=0 items=0 ppid=1 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:37.161407 kernel: audit: type=1300 audit(1734060457.139:142): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0c7194a0 a2=420 a3=0 items=0 ppid=1 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:37.139000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:27:37.201796 kernel: audit: type=1327 audit(1734060457.139:142): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:27:37.201819 kernel: audit: type=1131 audit(1734060457.139:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.219878 sshd[1906]: Accepted publickey for core from 139.178.68.195 port 58198 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:27:37.222670 sshd[1906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:27:37.224074 kernel: audit: type=1130 audit(1734060457.150:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.224848 systemd-logind[1656]: New session 11 of user core. Dec 13 03:27:37.225235 systemd[1]: Started session-11.scope. Dec 13 03:27:37.246417 kernel: audit: type=1106 audit(1734060457.151:145): pid=1879 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.151000 audit[1879]: USER_END pid=1879 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.271667 sudo[1912]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 03:27:37.271792 sudo[1912]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:27:37.272257 kernel: audit: type=1104 audit(1734060457.151:146): pid=1879 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.151000 audit[1879]: CRED_DISP pid=1879 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.295714 kernel: audit: type=1106 audit(1734060457.153:147): pid=1873 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.153000 audit[1873]: USER_END pid=1873 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.327766 kernel: audit: type=1104 audit(1734060457.153:148): pid=1873 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.153000 audit[1873]: CRED_DISP pid=1873 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.353644 kernel: audit: type=1130 audit(1734060457.153:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.202.71:22-139.178.68.195:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.202.71:22-139.178.68.195:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.202.71:22-139.178.68.195:58196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.219000 audit[1906]: USER_ACCT pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.222000 audit[1906]: CRED_ACQ pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.222000 audit[1906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc13b6a6b0 a2=3 a3=0 items=0 ppid=1 pid=1906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:37.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:27:37.227000 audit[1906]: USER_START pid=1906 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.227000 audit[1911]: CRED_ACQ pid=1911 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:37.270000 audit[1912]: USER_ACCT pid=1912 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.270000 audit[1912]: CRED_REFR pid=1912 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:37.271000 audit[1912]: USER_START pid=1912 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:38.039164 systemd[1]: Stopped kubelet.service. Dec 13 03:27:38.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:38.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:38.040610 systemd[1]: Starting kubelet.service... Dec 13 03:27:38.051436 systemd[1]: Reloading. Dec 13 03:27:38.103931 /usr/lib/systemd/system-generators/torcx-generator[1995]: time="2024-12-13T03:27:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:27:38.103988 /usr/lib/systemd/system-generators/torcx-generator[1995]: time="2024-12-13T03:27:38Z" level=info msg="torcx already run" Dec 13 03:27:38.185354 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:27:38.185366 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:27:38.198718 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:27:38.248129 systemd[1]: Started kubelet.service. Dec 13 03:27:38.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:38.250002 systemd[1]: Stopping kubelet.service... Dec 13 03:27:38.250251 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 03:27:38.250401 systemd[1]: Stopped kubelet.service. Dec 13 03:27:38.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:38.251247 systemd[1]: Starting kubelet.service... Dec 13 03:27:38.445219 systemd[1]: Started kubelet.service. Dec 13 03:27:38.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:38.467812 kubelet[2082]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:27:38.467812 kubelet[2082]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:27:38.467812 kubelet[2082]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:27:38.468060 kubelet[2082]: I1213 03:27:38.467841 2082 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:27:38.703425 kubelet[2082]: I1213 03:27:38.703329 2082 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 03:27:38.703425 kubelet[2082]: I1213 03:27:38.703363 2082 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:27:38.703545 kubelet[2082]: I1213 03:27:38.703506 2082 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 03:27:38.720070 kubelet[2082]: I1213 03:27:38.720004 2082 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:27:38.764212 kubelet[2082]: I1213 03:27:38.764129 2082 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:27:38.765267 kubelet[2082]: I1213 03:27:38.765189 2082 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:27:38.765739 kubelet[2082]: I1213 03:27:38.765658 2082 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:27:38.767205 kubelet[2082]: I1213 03:27:38.767126 2082 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:27:38.767205 kubelet[2082]: I1213 03:27:38.767175 2082 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:27:38.767506 kubelet[2082]: I1213 03:27:38.767405 2082 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:27:38.767661 kubelet[2082]: I1213 03:27:38.767625 2082 kubelet.go:396] "Attempting to sync node with API server" Dec 13 03:27:38.767773 kubelet[2082]: I1213 03:27:38.767701 2082 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:27:38.767868 kubelet[2082]: I1213 03:27:38.767788 2082 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:27:38.767868 kubelet[2082]: I1213 03:27:38.767835 2082 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:27:38.768040 kubelet[2082]: E1213 03:27:38.767902 2082 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:38.768146 kubelet[2082]: E1213 03:27:38.768050 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:38.774025 kubelet[2082]: I1213 03:27:38.773959 2082 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:27:38.793025 kubelet[2082]: I1213 03:27:38.792945 2082 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:27:38.793211 kubelet[2082]: W1213 03:27:38.793084 2082 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 03:27:38.794570 kubelet[2082]: I1213 03:27:38.794494 2082 server.go:1256] "Started kubelet" Dec 13 03:27:38.794862 kubelet[2082]: I1213 03:27:38.794806 2082 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:27:38.795051 kubelet[2082]: I1213 03:27:38.794938 2082 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:27:38.795369 kubelet[2082]: I1213 03:27:38.795316 2082 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:27:38.796000 audit[2082]: AVC avc: denied { mac_admin } for pid=2082 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:38.796000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:27:38.796000 audit[2082]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e4ca20 a1=c0009a1518 a2=c000e4c9f0 a3=25 items=0 ppid=1 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:27:38.796000 audit[2082]: AVC avc: denied { mac_admin } for pid=2082 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:38.796000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:27:38.796000 audit[2082]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000504f20 a1=c0009a1530 a2=c000e4cab0 a3=25 items=0 ppid=1 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:27:38.798081 kubelet[2082]: I1213 03:27:38.797002 2082 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:27:38.798081 kubelet[2082]: I1213 03:27:38.797096 2082 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:27:38.798081 kubelet[2082]: I1213 03:27:38.797252 2082 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:27:38.834675 kubelet[2082]: I1213 03:27:38.834531 2082 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:27:38.835043 kubelet[2082]: I1213 03:27:38.834991 2082 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 03:27:38.835497 kubelet[2082]: I1213 03:27:38.835416 2082 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 03:27:38.836662 kubelet[2082]: I1213 03:27:38.836597 2082 server.go:461] "Adding debug handlers to kubelet server" Dec 13 03:27:38.842289 kubelet[2082]: E1213 03:27:38.842236 2082 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.21\" not found" node="10.67.80.21" Dec 13 03:27:38.885391 kubelet[2082]: I1213 03:27:38.885318 2082 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:27:38.885758 kubelet[2082]: I1213 03:27:38.885650 2082 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:27:38.890648 kubelet[2082]: E1213 03:27:38.890597 2082 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:27:38.890923 kubelet[2082]: I1213 03:27:38.890752 2082 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:27:38.911534 kubelet[2082]: I1213 03:27:38.911517 2082 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:27:38.911534 kubelet[2082]: I1213 03:27:38.911536 2082 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:27:38.911651 kubelet[2082]: I1213 03:27:38.911551 2082 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:27:38.912572 kubelet[2082]: I1213 03:27:38.912558 2082 policy_none.go:49] "None policy: Start" Dec 13 03:27:38.912897 kubelet[2082]: I1213 03:27:38.912887 2082 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:27:38.912941 kubelet[2082]: I1213 03:27:38.912904 2082 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:27:38.913000 audit[2108]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:38.913000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc53693a0 a2=0 a3=7fffc536938c items=0 ppid=2082 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:27:38.914000 audit[2113]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:38.914000 audit[2113]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffc474b7e0 a2=0 a3=7fffc474b7cc items=0 ppid=2082 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:27:38.916487 kubelet[2082]: I1213 03:27:38.916475 2082 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:27:38.916000 audit[2082]: AVC avc: denied { mac_admin } for pid=2082 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:38.916000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:27:38.916000 audit[2082]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bdbe00 a1=c000bcf1a0 a2=c000bdbdd0 a3=25 items=0 ppid=1 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.916000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:27:38.916670 kubelet[2082]: I1213 03:27:38.916527 2082 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:27:38.916707 kubelet[2082]: I1213 03:27:38.916678 2082 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:27:38.917213 kubelet[2082]: E1213 03:27:38.917202 2082 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.21\" not found" Dec 13 03:27:38.934671 kubelet[2082]: I1213 03:27:38.934627 2082 kubelet_node_status.go:73] "Attempting to register node" node="10.67.80.21" Dec 13 03:27:38.915000 audit[2115]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:38.915000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc09bf44e0 a2=0 a3=7ffc09bf44cc items=0 ppid=2082 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:27:38.939976 kubelet[2082]: I1213 03:27:38.939933 2082 kubelet_node_status.go:76] "Successfully registered node" node="10.67.80.21" Dec 13 03:27:38.940000 audit[2120]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:38.940000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcff56dc70 a2=0 a3=7ffcff56dc5c items=0 ppid=2082 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:38.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:27:39.033000 audit[2125]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:39.033000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffefb0e80b0 a2=0 a3=7ffefb0e809c items=0 ppid=2082 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 03:27:39.035428 kubelet[2082]: I1213 03:27:39.035390 2082 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:27:39.034000 audit[2126]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:39.034000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8e97fc80 a2=0 a3=7ffd8e97fc6c items=0 ppid=2082 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:27:39.034000 audit[2127]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:39.034000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe53fc8930 a2=0 a3=7ffe53fc891c items=0 ppid=2082 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:27:39.036100 kubelet[2082]: I1213 03:27:39.035997 2082 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:27:39.036100 kubelet[2082]: I1213 03:27:39.036014 2082 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:27:39.036100 kubelet[2082]: I1213 03:27:39.036026 2082 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 03:27:39.036165 kubelet[2082]: E1213 03:27:39.036102 2082 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 03:27:39.035000 audit[2128]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:39.035000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc1c0b2aa0 a2=0 a3=7ffc1c0b2a8c items=0 ppid=2082 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:27:39.035000 audit[2129]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:39.035000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2cb21a60 a2=0 a3=7ffc2cb21a4c items=0 ppid=2082 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:27:39.035000 audit[2130]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:39.035000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6b451b50 a2=0 a3=7ffd6b451b3c items=0 ppid=2082 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:27:39.036000 audit[2131]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:39.036000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff803d1ba0 a2=0 a3=7fff803d1b8c items=0 ppid=2082 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:27:39.037000 audit[2133]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:39.037000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffeb750d30 a2=0 a3=7fffeb750d1c items=0 ppid=2082 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:39.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:27:39.049345 kubelet[2082]: I1213 03:27:39.049331 2082 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 03:27:39.049491 env[1664]: time="2024-12-13T03:27:39.049470214Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 03:27:39.049660 kubelet[2082]: I1213 03:27:39.049554 2082 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 03:27:39.704694 kubelet[2082]: I1213 03:27:39.704582 2082 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 03:27:39.705881 kubelet[2082]: W1213 03:27:39.704969 2082 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:27:39.705881 kubelet[2082]: W1213 03:27:39.704997 2082 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:27:39.705881 kubelet[2082]: W1213 03:27:39.705111 2082 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 03:27:39.768167 kubelet[2082]: I1213 03:27:39.768097 2082 apiserver.go:52] "Watching apiserver" Dec 13 03:27:39.768480 kubelet[2082]: E1213 03:27:39.768175 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:39.787806 kubelet[2082]: I1213 03:27:39.787729 2082 topology_manager.go:215] "Topology Admit Handler" podUID="cf99a625-69d0-4097-bd94-02250764a4bf" podNamespace="kube-system" podName="kube-proxy-7g5xj" Dec 13 03:27:39.788125 kubelet[2082]: I1213 03:27:39.787971 2082 topology_manager.go:215] "Topology Admit Handler" podUID="6066cdfb-51d6-4861-93ee-c6673faa2606" podNamespace="calico-system" podName="calico-node-8pvmn" Dec 13 03:27:39.788480 kubelet[2082]: I1213 03:27:39.788429 2082 topology_manager.go:215] "Topology Admit Handler" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" podNamespace="calico-system" podName="csi-node-driver-k69xp" Dec 13 03:27:39.788998 kubelet[2082]: E1213 03:27:39.788948 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:39.836076 kubelet[2082]: I1213 03:27:39.836023 2082 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 03:27:39.840059 kubelet[2082]: I1213 03:27:39.840015 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cf99a625-69d0-4097-bd94-02250764a4bf-kube-proxy\") pod \"kube-proxy-7g5xj\" (UID: \"cf99a625-69d0-4097-bd94-02250764a4bf\") " pod="kube-system/kube-proxy-7g5xj" Dec 13 03:27:39.840059 kubelet[2082]: I1213 03:27:39.840048 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf99a625-69d0-4097-bd94-02250764a4bf-xtables-lock\") pod \"kube-proxy-7g5xj\" (UID: \"cf99a625-69d0-4097-bd94-02250764a4bf\") " pod="kube-system/kube-proxy-7g5xj" Dec 13 03:27:39.840156 kubelet[2082]: I1213 03:27:39.840069 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf99a625-69d0-4097-bd94-02250764a4bf-lib-modules\") pod \"kube-proxy-7g5xj\" (UID: \"cf99a625-69d0-4097-bd94-02250764a4bf\") " pod="kube-system/kube-proxy-7g5xj" Dec 13 03:27:39.840156 kubelet[2082]: I1213 03:27:39.840093 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-xtables-lock\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840156 kubelet[2082]: I1213 03:27:39.840145 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-var-run-calico\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840269 kubelet[2082]: I1213 03:27:39.840182 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-cni-log-dir\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840269 kubelet[2082]: I1213 03:27:39.840239 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nzm8x\" (UniqueName: \"kubernetes.io/projected/6066cdfb-51d6-4861-93ee-c6673faa2606-kube-api-access-nzm8x\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840332 kubelet[2082]: I1213 03:27:39.840282 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-policysync\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840332 kubelet[2082]: I1213 03:27:39.840308 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6066cdfb-51d6-4861-93ee-c6673faa2606-node-certs\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840332 kubelet[2082]: I1213 03:27:39.840331 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-var-lib-calico\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840446 kubelet[2082]: I1213 03:27:39.840358 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-flexvol-driver-host\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840446 kubelet[2082]: I1213 03:27:39.840396 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4aee2773-5ddc-49cc-a39f-e47758e92dae-kubelet-dir\") pod \"csi-node-driver-k69xp\" (UID: \"4aee2773-5ddc-49cc-a39f-e47758e92dae\") " pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:39.840509 kubelet[2082]: I1213 03:27:39.840443 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4aee2773-5ddc-49cc-a39f-e47758e92dae-registration-dir\") pod \"csi-node-driver-k69xp\" (UID: \"4aee2773-5ddc-49cc-a39f-e47758e92dae\") " pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:39.840509 kubelet[2082]: I1213 03:27:39.840481 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-725g9\" (UniqueName: \"kubernetes.io/projected/cf99a625-69d0-4097-bd94-02250764a4bf-kube-api-access-725g9\") pod \"kube-proxy-7g5xj\" (UID: \"cf99a625-69d0-4097-bd94-02250764a4bf\") " pod="kube-system/kube-proxy-7g5xj" Dec 13 03:27:39.840509 kubelet[2082]: I1213 03:27:39.840508 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-lib-modules\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840604 kubelet[2082]: I1213 03:27:39.840539 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-cni-net-dir\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840604 kubelet[2082]: I1213 03:27:39.840585 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4aee2773-5ddc-49cc-a39f-e47758e92dae-socket-dir\") pod \"csi-node-driver-k69xp\" (UID: \"4aee2773-5ddc-49cc-a39f-e47758e92dae\") " pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:39.840665 kubelet[2082]: I1213 03:27:39.840625 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hw6z6\" (UniqueName: \"kubernetes.io/projected/4aee2773-5ddc-49cc-a39f-e47758e92dae-kube-api-access-hw6z6\") pod \"csi-node-driver-k69xp\" (UID: \"4aee2773-5ddc-49cc-a39f-e47758e92dae\") " pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:39.840665 kubelet[2082]: I1213 03:27:39.840647 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6066cdfb-51d6-4861-93ee-c6673faa2606-tigera-ca-bundle\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840731 kubelet[2082]: I1213 03:27:39.840667 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6066cdfb-51d6-4861-93ee-c6673faa2606-cni-bin-dir\") pod \"calico-node-8pvmn\" (UID: \"6066cdfb-51d6-4861-93ee-c6673faa2606\") " pod="calico-system/calico-node-8pvmn" Dec 13 03:27:39.840731 kubelet[2082]: I1213 03:27:39.840688 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4aee2773-5ddc-49cc-a39f-e47758e92dae-varrun\") pod \"csi-node-driver-k69xp\" (UID: \"4aee2773-5ddc-49cc-a39f-e47758e92dae\") " pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:39.943748 kubelet[2082]: E1213 03:27:39.943651 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.943748 kubelet[2082]: W1213 03:27:39.943705 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.944122 kubelet[2082]: E1213 03:27:39.943765 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.944454 kubelet[2082]: E1213 03:27:39.944378 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.944454 kubelet[2082]: W1213 03:27:39.944415 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.944454 kubelet[2082]: E1213 03:27:39.944463 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.945110 kubelet[2082]: E1213 03:27:39.945035 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.945110 kubelet[2082]: W1213 03:27:39.945071 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.945110 kubelet[2082]: E1213 03:27:39.945113 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.949139 kubelet[2082]: E1213 03:27:39.949103 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.949139 kubelet[2082]: W1213 03:27:39.949110 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.949139 kubelet[2082]: E1213 03:27:39.949117 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.955100 kubelet[2082]: E1213 03:27:39.955032 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.955100 kubelet[2082]: W1213 03:27:39.955038 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.955100 kubelet[2082]: E1213 03:27:39.955048 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.955184 kubelet[2082]: E1213 03:27:39.955176 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.955184 kubelet[2082]: W1213 03:27:39.955181 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.955220 kubelet[2082]: E1213 03:27:39.955189 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.955272 kubelet[2082]: E1213 03:27:39.955268 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:27:39.955292 kubelet[2082]: W1213 03:27:39.955272 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:27:39.955292 kubelet[2082]: E1213 03:27:39.955278 2082 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:27:39.961355 sudo[1912]: pam_unix(sudo:session): session closed for user root Dec 13 03:27:39.961000 audit[1912]: USER_END pid=1912 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:39.961000 audit[1912]: CRED_DISP pid=1912 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:27:39.962142 sshd[1906]: pam_unix(sshd:session): session closed for user core Dec 13 03:27:39.962000 audit[1906]: USER_END pid=1906 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:39.962000 audit[1906]: CRED_DISP pid=1906 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:27:39.963552 systemd[1]: sshd@8-147.75.202.71:22-139.178.68.195:58198.service: Deactivated successfully. Dec 13 03:27:39.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.202.71:22-139.178.68.195:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:27:39.964144 systemd-logind[1656]: Session 11 logged out. Waiting for processes to exit. Dec 13 03:27:39.964163 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 03:27:39.964822 systemd-logind[1656]: Removed session 11. Dec 13 03:27:40.094552 env[1664]: time="2024-12-13T03:27:40.094494422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7g5xj,Uid:cf99a625-69d0-4097-bd94-02250764a4bf,Namespace:kube-system,Attempt:0,}" Dec 13 03:27:40.094552 env[1664]: time="2024-12-13T03:27:40.094536827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8pvmn,Uid:6066cdfb-51d6-4861-93ee-c6673faa2606,Namespace:calico-system,Attempt:0,}" Dec 13 03:27:40.718075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount835636403.mount: Deactivated successfully. Dec 13 03:27:40.719565 env[1664]: time="2024-12-13T03:27:40.719547260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.720443 env[1664]: time="2024-12-13T03:27:40.720402245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.720841 env[1664]: time="2024-12-13T03:27:40.720804377Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.721576 env[1664]: time="2024-12-13T03:27:40.721538318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.721932 env[1664]: time="2024-12-13T03:27:40.721892620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.723055 env[1664]: time="2024-12-13T03:27:40.723013904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.723436 env[1664]: time="2024-12-13T03:27:40.723397270Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.725177 env[1664]: time="2024-12-13T03:27:40.725137648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:40.732413 env[1664]: time="2024-12-13T03:27:40.732380851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:27:40.732413 env[1664]: time="2024-12-13T03:27:40.732402567Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:27:40.732496 env[1664]: time="2024-12-13T03:27:40.732412363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:27:40.732496 env[1664]: time="2024-12-13T03:27:40.732479700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed pid=2159 runtime=io.containerd.runc.v2 Dec 13 03:27:40.732665 env[1664]: time="2024-12-13T03:27:40.732616860Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:27:40.732665 env[1664]: time="2024-12-13T03:27:40.732633157Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:27:40.732665 env[1664]: time="2024-12-13T03:27:40.732642050Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:27:40.732737 env[1664]: time="2024-12-13T03:27:40.732699933Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a43ad87b99f2314642df0c32151446820c3c56c00acf761c200dc1bd143ce3e pid=2163 runtime=io.containerd.runc.v2 Dec 13 03:27:40.748350 env[1664]: time="2024-12-13T03:27:40.748319968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7g5xj,Uid:cf99a625-69d0-4097-bd94-02250764a4bf,Namespace:kube-system,Attempt:0,} returns sandbox id \"4a43ad87b99f2314642df0c32151446820c3c56c00acf761c200dc1bd143ce3e\"" Dec 13 03:27:40.748430 env[1664]: time="2024-12-13T03:27:40.748402412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8pvmn,Uid:6066cdfb-51d6-4861-93ee-c6673faa2606,Namespace:calico-system,Attempt:0,} returns sandbox id \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\"" Dec 13 03:27:40.749331 env[1664]: time="2024-12-13T03:27:40.749320049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 03:27:40.769321 kubelet[2082]: E1213 03:27:40.769281 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:41.037285 kubelet[2082]: E1213 03:27:41.037163 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:41.770383 kubelet[2082]: E1213 03:27:41.770238 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:42.228677 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1914129372.mount: Deactivated successfully. Dec 13 03:27:42.344656 env[1664]: time="2024-12-13T03:27:42.344600339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:42.345111 env[1664]: time="2024-12-13T03:27:42.345070690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:42.345920 env[1664]: time="2024-12-13T03:27:42.345880302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:42.346451 env[1664]: time="2024-12-13T03:27:42.346374592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:42.346740 env[1664]: time="2024-12-13T03:27:42.346699691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 03:27:42.347078 env[1664]: time="2024-12-13T03:27:42.347064271Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 03:27:42.347735 env[1664]: time="2024-12-13T03:27:42.347704882Z" level=info msg="CreateContainer within sandbox \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:27:42.352437 env[1664]: time="2024-12-13T03:27:42.352396676Z" level=info msg="CreateContainer within sandbox \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3374e78180191f68dda8e059643094ed7605b217328994254a762a009e60c545\"" Dec 13 03:27:42.352696 env[1664]: time="2024-12-13T03:27:42.352664679Z" level=info msg="StartContainer for \"3374e78180191f68dda8e059643094ed7605b217328994254a762a009e60c545\"" Dec 13 03:27:42.375259 env[1664]: time="2024-12-13T03:27:42.375237337Z" level=info msg="StartContainer for \"3374e78180191f68dda8e059643094ed7605b217328994254a762a009e60c545\" returns successfully" Dec 13 03:27:42.449805 env[1664]: time="2024-12-13T03:27:42.449663352Z" level=info msg="shim disconnected" id=3374e78180191f68dda8e059643094ed7605b217328994254a762a009e60c545 Dec 13 03:27:42.449805 env[1664]: time="2024-12-13T03:27:42.449770517Z" level=warning msg="cleaning up after shim disconnected" id=3374e78180191f68dda8e059643094ed7605b217328994254a762a009e60c545 namespace=k8s.io Dec 13 03:27:42.449805 env[1664]: time="2024-12-13T03:27:42.449803016Z" level=info msg="cleaning up dead shim" Dec 13 03:27:42.466195 env[1664]: time="2024-12-13T03:27:42.466081078Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:27:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2274 runtime=io.containerd.runc.v2\n" Dec 13 03:27:42.770576 kubelet[2082]: E1213 03:27:42.770473 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:43.036395 kubelet[2082]: E1213 03:27:43.036279 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:43.198824 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3374e78180191f68dda8e059643094ed7605b217328994254a762a009e60c545-rootfs.mount: Deactivated successfully. Dec 13 03:27:43.357335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2030151519.mount: Deactivated successfully. Dec 13 03:27:43.715046 env[1664]: time="2024-12-13T03:27:43.714965554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:43.715644 env[1664]: time="2024-12-13T03:27:43.715592774Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:43.716179 env[1664]: time="2024-12-13T03:27:43.716134257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:43.717180 env[1664]: time="2024-12-13T03:27:43.717144406Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:43.717331 env[1664]: time="2024-12-13T03:27:43.717319436Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 03:27:43.717721 env[1664]: time="2024-12-13T03:27:43.717674736Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 03:27:43.718414 env[1664]: time="2024-12-13T03:27:43.718400670Z" level=info msg="CreateContainer within sandbox \"4a43ad87b99f2314642df0c32151446820c3c56c00acf761c200dc1bd143ce3e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 03:27:43.724714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2315568197.mount: Deactivated successfully. Dec 13 03:27:43.741226 env[1664]: time="2024-12-13T03:27:43.741176470Z" level=info msg="CreateContainer within sandbox \"4a43ad87b99f2314642df0c32151446820c3c56c00acf761c200dc1bd143ce3e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"08cb4a8d383366f55ba1eb62ce4e56fe875a15050f23184ee65d54b3f5ad9f51\"" Dec 13 03:27:43.741529 env[1664]: time="2024-12-13T03:27:43.741469091Z" level=info msg="StartContainer for \"08cb4a8d383366f55ba1eb62ce4e56fe875a15050f23184ee65d54b3f5ad9f51\"" Dec 13 03:27:43.765077 env[1664]: time="2024-12-13T03:27:43.765027939Z" level=info msg="StartContainer for \"08cb4a8d383366f55ba1eb62ce4e56fe875a15050f23184ee65d54b3f5ad9f51\" returns successfully" Dec 13 03:27:43.770703 kubelet[2082]: E1213 03:27:43.770661 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:43.799000 audit[2360]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.805399 kernel: kauditd_printk_skb: 69 callbacks suppressed Dec 13 03:27:43.805476 kernel: audit: type=1325 audit(1734060463.799:184): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.799000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca121f4a0 a2=0 a3=7ffca121f48c items=0 ppid=2308 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.920158 kernel: audit: type=1300 audit(1734060463.799:184): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca121f4a0 a2=0 a3=7ffca121f48c items=0 ppid=2308 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.920196 kernel: audit: type=1327 audit(1734060463.799:184): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:27:43.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:27:43.799000 audit[2361]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.022245 kernel: audit: type=1325 audit(1734060463.799:185): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.022277 kernel: audit: type=1300 audit(1734060463.799:185): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9b8c7e30 a2=0 a3=7ffd9b8c7e1c items=0 ppid=2308 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.799000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9b8c7e30 a2=0 a3=7ffd9b8c7e1c items=0 ppid=2308 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.062991 kubelet[2082]: I1213 03:27:44.062951 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7g5xj" podStartSLOduration=3.094546418 podStartE2EDuration="6.062924526s" podCreationTimestamp="2024-12-13 03:27:38 +0000 UTC" firstStartedPulling="2024-12-13 03:27:40.749155523 +0000 UTC m=+2.301212142" lastFinishedPulling="2024-12-13 03:27:43.717533626 +0000 UTC m=+5.269590250" observedRunningTime="2024-12-13 03:27:44.06288087 +0000 UTC m=+5.614937493" watchObservedRunningTime="2024-12-13 03:27:44.062924526 +0000 UTC m=+5.614981149" Dec 13 03:27:44.111966 kernel: audit: type=1327 audit(1734060463.799:185): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:27:43.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:27:44.167736 kernel: audit: type=1325 audit(1734060463.800:186): table=nat:16 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.800000 audit[2362]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.224082 kernel: audit: type=1300 audit(1734060463.800:186): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd35c2da0 a2=0 a3=7fffd35c2d8c items=0 ppid=2308 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.800000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd35c2da0 a2=0 a3=7fffd35c2d8c items=0 ppid=2308 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.319425 kernel: audit: type=1327 audit(1734060463.800:186): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:27:43.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:27:44.376988 kernel: audit: type=1325 audit(1734060463.800:187): table=nat:17 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:43.800000 audit[2363]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:43.800000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdf1c8de0 a2=0 a3=7ffcdf1c8dcc items=0 ppid=2308 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:27:43.800000 audit[2364]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.800000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeafdf0630 a2=0 a3=7ffeafdf061c items=0 ppid=2308 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:27:43.801000 audit[2365]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:43.801000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceaa73470 a2=0 a3=7ffceaa7345c items=0 ppid=2308 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:27:43.899000 audit[2366]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.899000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdeb250680 a2=0 a3=7ffdeb25066c items=0 ppid=2308 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:27:43.900000 audit[2368]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.900000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3baf0bc0 a2=0 a3=7ffc3baf0bac items=0 ppid=2308 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 03:27:43.902000 audit[2371]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.902000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd92827aa0 a2=0 a3=7ffd92827a8c items=0 ppid=2308 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 03:27:43.903000 audit[2372]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.903000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc000badc0 a2=0 a3=7ffc000badac items=0 ppid=2308 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:27:43.904000 audit[2374]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.904000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2c730600 a2=0 a3=7ffe2c7305ec items=0 ppid=2308 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:27:43.904000 audit[2375]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.904000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0c8a41a0 a2=0 a3=7ffe0c8a418c items=0 ppid=2308 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:27:43.906000 audit[2377]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.906000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb215d070 a2=0 a3=7ffdb215d05c items=0 ppid=2308 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:27:43.907000 audit[2380]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.907000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1cedc6a0 a2=0 a3=7fff1cedc68c items=0 ppid=2308 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 03:27:43.908000 audit[2381]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.908000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeec0a460 a2=0 a3=7ffeeec0a44c items=0 ppid=2308 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:27:43.909000 audit[2383]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.909000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc16d79d80 a2=0 a3=7ffc16d79d6c items=0 ppid=2308 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:27:43.910000 audit[2384]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:43.910000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef665bbd0 a2=0 a3=7ffef665bbbc items=0 ppid=2308 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:43.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:27:44.436000 audit[2386]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.436000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc406c1a40 a2=0 a3=7ffc406c1a2c items=0 ppid=2308 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:27:44.438000 audit[2389]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.438000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9e3ca0e0 a2=0 a3=7fff9e3ca0cc items=0 ppid=2308 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:27:44.439000 audit[2392]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.439000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe20217260 a2=0 a3=7ffe2021724c items=0 ppid=2308 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:27:44.440000 audit[2393]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.440000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4f94d110 a2=0 a3=7ffd4f94d0fc items=0 ppid=2308 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:27:44.441000 audit[2395]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.441000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5abcdd10 a2=0 a3=7ffd5abcdcfc items=0 ppid=2308 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:27:44.474000 audit[2400]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.474000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff241ea850 a2=0 a3=7fff241ea83c items=0 ppid=2308 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:27:44.474000 audit[2401]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.474000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe584d7930 a2=0 a3=7ffe584d791c items=0 ppid=2308 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:27:44.475000 audit[2403]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:27:44.475000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3d77c800 a2=0 a3=7ffc3d77c7ec items=0 ppid=2308 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:27:44.482000 audit[2409]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:27:44.482000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd160657f0 a2=0 a3=7ffd160657dc items=0 ppid=2308 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:27:44.513000 audit[2409]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:27:44.513000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffd160657f0 a2=0 a3=7ffd160657dc items=0 ppid=2308 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:27:44.521000 audit[2417]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.521000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc95ef2340 a2=0 a3=7ffc95ef232c items=0 ppid=2308 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:27:44.522000 audit[2419]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.522000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffffa5a6f20 a2=0 a3=7ffffa5a6f0c items=0 ppid=2308 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 03:27:44.524000 audit[2422]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.524000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff3e8c8a40 a2=0 a3=7fff3e8c8a2c items=0 ppid=2308 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 03:27:44.525000 audit[2423]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.525000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed0f86f40 a2=0 a3=7ffed0f86f2c items=0 ppid=2308 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:27:44.526000 audit[2425]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.526000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd7981580 a2=0 a3=7ffcd798156c items=0 ppid=2308 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.526000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:27:44.527000 audit[2426]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.527000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccb7104e0 a2=0 a3=7ffccb7104cc items=0 ppid=2308 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:27:44.528000 audit[2428]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.528000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc9472e40 a2=0 a3=7ffcc9472e2c items=0 ppid=2308 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 03:27:44.530000 audit[2431]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.530000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff9d20c980 a2=0 a3=7fff9d20c96c items=0 ppid=2308 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:27:44.531000 audit[2432]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.531000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc70316ef0 a2=0 a3=7ffc70316edc items=0 ppid=2308 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:27:44.532000 audit[2434]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.532000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa18c64d0 a2=0 a3=7fffa18c64bc items=0 ppid=2308 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:27:44.533000 audit[2435]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.533000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd131e7af0 a2=0 a3=7ffd131e7adc items=0 ppid=2308 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:27:44.534000 audit[2437]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.534000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff14ff81e0 a2=0 a3=7fff14ff81cc items=0 ppid=2308 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:27:44.536000 audit[2440]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.536000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc6f66cc0 a2=0 a3=7ffdc6f66cac items=0 ppid=2308 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:27:44.538000 audit[2443]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.538000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff52b94280 a2=0 a3=7fff52b9426c items=0 ppid=2308 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 03:27:44.539000 audit[2444]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.539000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1ed58c60 a2=0 a3=7fff1ed58c4c items=0 ppid=2308 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:27:44.540000 audit[2446]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.540000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd2ecc50c0 a2=0 a3=7ffd2ecc50ac items=0 ppid=2308 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:27:44.542000 audit[2449]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.542000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffae955bb0 a2=0 a3=7fffae955b9c items=0 ppid=2308 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:27:44.543000 audit[2450]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.543000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8dd9f100 a2=0 a3=7ffc8dd9f0ec items=0 ppid=2308 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:27:44.544000 audit[2452]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.544000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff626a7f50 a2=0 a3=7fff626a7f3c items=0 ppid=2308 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:27:44.545000 audit[2453]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.545000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc93eaabf0 a2=0 a3=7ffc93eaabdc items=0 ppid=2308 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:27:44.547000 audit[2455]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.547000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff91cf6b20 a2=0 a3=7fff91cf6b0c items=0 ppid=2308 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:27:44.549000 audit[2458]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:27:44.549000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa6ae7990 a2=0 a3=7fffa6ae797c items=0 ppid=2308 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:27:44.551000 audit[2460]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:27:44.551000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcdfb8c940 a2=0 a3=7ffcdfb8c92c items=0 ppid=2308 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.551000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:27:44.551000 audit[2460]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:27:44.551000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcdfb8c940 a2=0 a3=7ffcdfb8c92c items=0 ppid=2308 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:44.551000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:27:44.771503 kubelet[2082]: E1213 03:27:44.771408 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:45.037312 kubelet[2082]: E1213 03:27:45.037119 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:45.771567 kubelet[2082]: E1213 03:27:45.771548 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:46.772565 kubelet[2082]: E1213 03:27:46.772485 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:47.037650 kubelet[2082]: E1213 03:27:47.037460 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:47.773522 kubelet[2082]: E1213 03:27:47.773454 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:48.548588 env[1664]: time="2024-12-13T03:27:48.548530343Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:48.549076 env[1664]: time="2024-12-13T03:27:48.549017855Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:48.549768 env[1664]: time="2024-12-13T03:27:48.549742500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:48.550479 env[1664]: time="2024-12-13T03:27:48.550468933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:48.550736 env[1664]: time="2024-12-13T03:27:48.550724608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 03:27:48.551649 env[1664]: time="2024-12-13T03:27:48.551633417Z" level=info msg="CreateContainer within sandbox \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:27:48.556907 env[1664]: time="2024-12-13T03:27:48.556889094Z" level=info msg="CreateContainer within sandbox \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e33f11e028b96e66d7801328a37740a478b2c9c2081a787201dd1483fe2226d8\"" Dec 13 03:27:48.557154 env[1664]: time="2024-12-13T03:27:48.557128899Z" level=info msg="StartContainer for \"e33f11e028b96e66d7801328a37740a478b2c9c2081a787201dd1483fe2226d8\"" Dec 13 03:27:48.581017 env[1664]: time="2024-12-13T03:27:48.580991019Z" level=info msg="StartContainer for \"e33f11e028b96e66d7801328a37740a478b2c9c2081a787201dd1483fe2226d8\" returns successfully" Dec 13 03:27:48.774380 kubelet[2082]: E1213 03:27:48.774287 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:49.037428 kubelet[2082]: E1213 03:27:49.037331 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:49.324037 env[1664]: time="2024-12-13T03:27:49.323684860Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:27:49.364262 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e33f11e028b96e66d7801328a37740a478b2c9c2081a787201dd1483fe2226d8-rootfs.mount: Deactivated successfully. Dec 13 03:27:49.384768 kubelet[2082]: I1213 03:27:49.384690 2082 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 03:27:49.774603 kubelet[2082]: E1213 03:27:49.774493 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:50.028690 env[1664]: time="2024-12-13T03:27:50.028420035Z" level=info msg="shim disconnected" id=e33f11e028b96e66d7801328a37740a478b2c9c2081a787201dd1483fe2226d8 Dec 13 03:27:50.028690 env[1664]: time="2024-12-13T03:27:50.028543361Z" level=warning msg="cleaning up after shim disconnected" id=e33f11e028b96e66d7801328a37740a478b2c9c2081a787201dd1483fe2226d8 namespace=k8s.io Dec 13 03:27:50.028690 env[1664]: time="2024-12-13T03:27:50.028583252Z" level=info msg="cleaning up dead shim" Dec 13 03:27:50.044269 env[1664]: time="2024-12-13T03:27:50.044194712Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:27:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2522 runtime=io.containerd.runc.v2\n" Dec 13 03:27:50.070334 env[1664]: time="2024-12-13T03:27:50.070262743Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 03:27:50.774995 kubelet[2082]: E1213 03:27:50.774880 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:51.042151 env[1664]: time="2024-12-13T03:27:51.042094255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k69xp,Uid:4aee2773-5ddc-49cc-a39f-e47758e92dae,Namespace:calico-system,Attempt:0,}" Dec 13 03:27:51.073689 env[1664]: time="2024-12-13T03:27:51.073647900Z" level=error msg="Failed to destroy network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.073895 env[1664]: time="2024-12-13T03:27:51.073874449Z" level=error msg="encountered an error cleaning up failed sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.073955 env[1664]: time="2024-12-13T03:27:51.073904613Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k69xp,Uid:4aee2773-5ddc-49cc-a39f-e47758e92dae,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.074062 kubelet[2082]: E1213 03:27:51.074047 2082 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.074119 kubelet[2082]: E1213 03:27:51.074087 2082 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:51.074119 kubelet[2082]: E1213 03:27:51.074104 2082 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k69xp" Dec 13 03:27:51.074207 kubelet[2082]: E1213 03:27:51.074144 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-k69xp_calico-system(4aee2773-5ddc-49cc-a39f-e47758e92dae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-k69xp_calico-system(4aee2773-5ddc-49cc-a39f-e47758e92dae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:51.075219 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830-shm.mount: Deactivated successfully. Dec 13 03:27:51.199379 kubelet[2082]: I1213 03:27:51.199249 2082 topology_manager.go:215] "Topology Admit Handler" podUID="44884b3d-9f04-4ed6-b0df-2ae22b77bdd7" podNamespace="default" podName="nginx-deployment-6d5f899847-82zwk" Dec 13 03:27:51.219744 kubelet[2082]: I1213 03:27:51.219704 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tkt7j\" (UniqueName: \"kubernetes.io/projected/44884b3d-9f04-4ed6-b0df-2ae22b77bdd7-kube-api-access-tkt7j\") pod \"nginx-deployment-6d5f899847-82zwk\" (UID: \"44884b3d-9f04-4ed6-b0df-2ae22b77bdd7\") " pod="default/nginx-deployment-6d5f899847-82zwk" Dec 13 03:27:51.505046 env[1664]: time="2024-12-13T03:27:51.504936163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-82zwk,Uid:44884b3d-9f04-4ed6-b0df-2ae22b77bdd7,Namespace:default,Attempt:0,}" Dec 13 03:27:51.545394 env[1664]: time="2024-12-13T03:27:51.545349722Z" level=error msg="Failed to destroy network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.545635 env[1664]: time="2024-12-13T03:27:51.545585002Z" level=error msg="encountered an error cleaning up failed sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.545635 env[1664]: time="2024-12-13T03:27:51.545619622Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-82zwk,Uid:44884b3d-9f04-4ed6-b0df-2ae22b77bdd7,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.545816 kubelet[2082]: E1213 03:27:51.545800 2082 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:51.545865 kubelet[2082]: E1213 03:27:51.545843 2082 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-82zwk" Dec 13 03:27:51.545865 kubelet[2082]: E1213 03:27:51.545861 2082 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-82zwk" Dec 13 03:27:51.545932 kubelet[2082]: E1213 03:27:51.545905 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-82zwk_default(44884b3d-9f04-4ed6-b0df-2ae22b77bdd7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-82zwk_default(44884b3d-9f04-4ed6-b0df-2ae22b77bdd7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-82zwk" podUID="44884b3d-9f04-4ed6-b0df-2ae22b77bdd7" Dec 13 03:27:51.775562 kubelet[2082]: E1213 03:27:51.775463 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:52.049525 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0-shm.mount: Deactivated successfully. Dec 13 03:27:52.071104 kubelet[2082]: I1213 03:27:52.071091 2082 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Dec 13 03:27:52.071524 env[1664]: time="2024-12-13T03:27:52.071505963Z" level=info msg="StopPodSandbox for \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\"" Dec 13 03:27:52.071751 kubelet[2082]: I1213 03:27:52.071639 2082 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Dec 13 03:27:52.071899 env[1664]: time="2024-12-13T03:27:52.071881953Z" level=info msg="StopPodSandbox for \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\"" Dec 13 03:27:52.084727 env[1664]: time="2024-12-13T03:27:52.084663284Z" level=error msg="StopPodSandbox for \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\" failed" error="failed to destroy network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:52.084848 kubelet[2082]: E1213 03:27:52.084832 2082 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Dec 13 03:27:52.084902 kubelet[2082]: E1213 03:27:52.084879 2082 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830"} Dec 13 03:27:52.084927 kubelet[2082]: E1213 03:27:52.084902 2082 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4aee2773-5ddc-49cc-a39f-e47758e92dae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:27:52.084927 kubelet[2082]: E1213 03:27:52.084920 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4aee2773-5ddc-49cc-a39f-e47758e92dae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k69xp" podUID="4aee2773-5ddc-49cc-a39f-e47758e92dae" Dec 13 03:27:52.085237 env[1664]: time="2024-12-13T03:27:52.085208289Z" level=error msg="StopPodSandbox for \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\" failed" error="failed to destroy network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:27:52.085302 kubelet[2082]: E1213 03:27:52.085294 2082 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Dec 13 03:27:52.085349 kubelet[2082]: E1213 03:27:52.085312 2082 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0"} Dec 13 03:27:52.085349 kubelet[2082]: E1213 03:27:52.085347 2082 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"44884b3d-9f04-4ed6-b0df-2ae22b77bdd7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:27:52.085421 kubelet[2082]: E1213 03:27:52.085372 2082 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"44884b3d-9f04-4ed6-b0df-2ae22b77bdd7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-82zwk" podUID="44884b3d-9f04-4ed6-b0df-2ae22b77bdd7" Dec 13 03:27:52.776308 kubelet[2082]: E1213 03:27:52.776253 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:53.777377 kubelet[2082]: E1213 03:27:53.777281 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:54.777641 kubelet[2082]: E1213 03:27:54.777582 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:55.778460 kubelet[2082]: E1213 03:27:55.778398 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:56.224702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2894448296.mount: Deactivated successfully. Dec 13 03:27:56.245059 env[1664]: time="2024-12-13T03:27:56.245012247Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:56.245579 env[1664]: time="2024-12-13T03:27:56.245536962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:56.246085 env[1664]: time="2024-12-13T03:27:56.246046438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:56.246956 env[1664]: time="2024-12-13T03:27:56.246912971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:27:56.247121 env[1664]: time="2024-12-13T03:27:56.247076432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 03:27:56.251116 env[1664]: time="2024-12-13T03:27:56.251069071Z" level=info msg="CreateContainer within sandbox \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 03:27:56.257709 env[1664]: time="2024-12-13T03:27:56.257684571Z" level=info msg="CreateContainer within sandbox \"c4be91aec54d4fdbc21380c2edc4bd3409b8fcafb7e95bb4b3f11e4ca19013ed\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3a38c42aaa9d4b12b425fa9c4c81899e40c0a60dc621244ed62122efe7a17600\"" Dec 13 03:27:56.257990 env[1664]: time="2024-12-13T03:27:56.257951375Z" level=info msg="StartContainer for \"3a38c42aaa9d4b12b425fa9c4c81899e40c0a60dc621244ed62122efe7a17600\"" Dec 13 03:27:56.281746 env[1664]: time="2024-12-13T03:27:56.281691962Z" level=info msg="StartContainer for \"3a38c42aaa9d4b12b425fa9c4c81899e40c0a60dc621244ed62122efe7a17600\" returns successfully" Dec 13 03:27:56.389589 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 03:27:56.389650 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Dec 13 03:27:56.778998 kubelet[2082]: E1213 03:27:56.778888 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:57.703000 audit[2871]: AVC avc: denied { write } for pid=2871 comm="tee" name="fd" dev="proc" ino=31506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.731464 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 03:27:57.731587 kernel: audit: type=1400 audit(1734060477.703:235): avc: denied { write } for pid=2871 comm="tee" name="fd" dev="proc" ino=31506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.779990 kubelet[2082]: E1213 03:27:57.779971 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:57.703000 audit[2871]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf91a1a19 a2=241 a3=1b6 items=1 ppid=2842 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.891888 kernel: audit: type=1300 audit(1734060477.703:235): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf91a1a19 a2=241 a3=1b6 items=1 ppid=2842 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.891920 kernel: audit: type=1307 audit(1734060477.703:235): cwd="/etc/service/enabled/bird6/log" Dec 13 03:27:57.703000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 03:27:57.703000 audit: PATH item=0 name="/dev/fd/63" inode=29981 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.985013 kernel: audit: type=1302 audit(1734060477.703:235): item=0 name="/dev/fd/63" inode=29981 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.985047 kernel: audit: type=1327 audit(1734060477.703:235): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.985065 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 03:27:57.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:58.045501 kernel: audit: type=1400 audit(1734060477.703:236): avc: denied { write } for pid=2881 comm="tee" name="fd" dev="proc" ino=29984 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.703000 audit[2881]: AVC avc: denied { write } for pid=2881 comm="tee" name="fd" dev="proc" ino=29984 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:58.071839 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 03:27:58.134577 kernel: audit: type=1300 audit(1734060477.703:236): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeec5fa1a a2=241 a3=1b6 items=1 ppid=2841 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.703000 audit[2881]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeec5fa1a a2=241 a3=1b6 items=1 ppid=2841 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.161990 kernel: audit: backlog limit exceeded Dec 13 03:27:57.703000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 03:27:57.703000 audit: PATH item=0 name="/dev/fd/63" inode=32879 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.703000 audit[2877]: AVC avc: denied { write } for pid=2877 comm="tee" name="fd" dev="proc" ino=22032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.703000 audit[2877]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf1dfaa09 a2=241 a3=1b6 items=1 ppid=2845 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.703000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 03:27:57.703000 audit: PATH item=0 name="/dev/fd/63" inode=22029 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.703000 audit[2884]: AVC avc: denied { write } for pid=2884 comm="tee" name="fd" dev="proc" ino=27018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.703000 audit[2884]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef771ba0a a2=241 a3=1b6 items=1 ppid=2843 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.703000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 03:27:57.703000 audit: PATH item=0 name="/dev/fd/63" inode=27015 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.703000 audit[2885]: AVC avc: denied { write } for pid=2885 comm="tee" name="fd" dev="proc" ino=28244 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.703000 audit[2885]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd92ceda19 a2=241 a3=1b6 items=1 ppid=2844 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.703000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 03:27:57.703000 audit: PATH item=0 name="/dev/fd/63" inode=28241 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.703000 audit[2887]: AVC avc: denied { write } for pid=2887 comm="tee" name="fd" dev="proc" ino=29223 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.703000 audit[2887]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc185bea19 a2=241 a3=1b6 items=1 ppid=2846 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.703000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 03:27:57.703000 audit: PATH item=0 name="/dev/fd/63" inode=29220 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.704000 audit[2876]: AVC avc: denied { write } for pid=2876 comm="tee" name="fd" dev="proc" ino=24495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:27:57.704000 audit[2876]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5a172a1b a2=241 a3=1b6 items=1 ppid=2839 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.704000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 03:27:57.704000 audit: PATH item=0 name="/dev/fd/63" inode=18832 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:27:57.704000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.749000 audit: BPF prog-id=10 op=LOAD Dec 13 03:27:57.749000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd7321ee0 a2=98 a3=3 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.749000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:57.890000 audit: BPF prog-id=10 op=UNLOAD Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.890000 audit: BPF prog-id=11 op=LOAD Dec 13 03:27:57.890000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd7321cc0 a2=74 a3=540051 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.890000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:57.983000 audit: BPF prog-id=11 op=UNLOAD Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:57.983000 audit: BPF prog-id=12 op=LOAD Dec 13 03:27:57.983000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd7321cf0 a2=94 a3=2 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:57.983000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.277000 audit: BPF prog-id=12 op=UNLOAD Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit: BPF prog-id=13 op=LOAD Dec 13 03:27:58.357000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd7321bb0 a2=40 a3=1 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.357000 audit: BPF prog-id=13 op=UNLOAD Dec 13 03:27:58.357000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.357000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcd7321c80 a2=50 a3=7ffcd7321d60 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd7321bc0 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7321bf0 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7321b00 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd7321c10 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd7321bf0 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd7321be0 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd7321c10 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7321bf0 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7321c10 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7321be0 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.363000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.363000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd7321c50 a2=28 a3=0 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd7321a00 a2=50 a3=1 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit: BPF prog-id=14 op=LOAD Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd7321a00 a2=94 a3=5 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit: BPF prog-id=14 op=UNLOAD Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd7321ab0 a2=50 a3=1 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcd7321bd0 a2=4 a3=38 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd7321c20 a2=94 a3=6 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd73213d0 a2=94 a3=83 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.364000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:27:58.364000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd73213d0 a2=94 a3=83 items=0 ppid=2853 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit: BPF prog-id=15 op=LOAD Dec 13 03:27:58.368000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9cd482d0 a2=98 a3=1999999999999999 items=0 ppid=2853 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.368000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:27:58.368000 audit: BPF prog-id=15 op=UNLOAD Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit: BPF prog-id=16 op=LOAD Dec 13 03:27:58.368000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9cd481b0 a2=74 a3=ffff items=0 ppid=2853 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.368000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:27:58.368000 audit: BPF prog-id=16 op=UNLOAD Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.368000 audit: BPF prog-id=17 op=LOAD Dec 13 03:27:58.368000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9cd481f0 a2=40 a3=7ffe9cd483d0 items=0 ppid=2853 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.368000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:27:58.368000 audit: BPF prog-id=17 op=UNLOAD Dec 13 03:27:58.397128 systemd-networkd[1404]: vxlan.calico: Link UP Dec 13 03:27:58.397131 systemd-networkd[1404]: vxlan.calico: Gained carrier Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit: BPF prog-id=18 op=LOAD Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6bac4980 a2=98 a3=ffffffff items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit: BPF prog-id=18 op=UNLOAD Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit: BPF prog-id=19 op=LOAD Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6bac4790 a2=74 a3=540051 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit: BPF prog-id=19 op=UNLOAD Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit: BPF prog-id=20 op=LOAD Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6bac47c0 a2=94 a3=2 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit: BPF prog-id=20 op=UNLOAD Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd6bac4690 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6bac46c0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6bac45d0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd6bac46e0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd6bac46c0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd6bac46b0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd6bac46e0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6bac46c0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6bac46e0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6bac46b0 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd6bac4720 a2=28 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit: BPF prog-id=21 op=LOAD Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6bac4590 a2=40 a3=0 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.411000 audit: BPF prog-id=21 op=UNLOAD Dec 13 03:27:58.411000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.411000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd6bac4580 a2=50 a3=2800 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd6bac4580 a2=50 a3=2800 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit: BPF prog-id=22 op=LOAD Dec 13 03:27:58.412000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6bac3da0 a2=94 a3=2 items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.412000 audit: BPF prog-id=22 op=UNLOAD Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.412000 audit: BPF prog-id=23 op=LOAD Dec 13 03:27:58.412000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6bac3ea0 a2=94 a3=2d items=0 ppid=2853 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit: BPF prog-id=24 op=LOAD Dec 13 03:27:58.413000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffecfb54680 a2=98 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.413000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.413000 audit: BPF prog-id=24 op=UNLOAD Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit: BPF prog-id=25 op=LOAD Dec 13 03:27:58.413000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecfb54460 a2=74 a3=540051 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.413000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.413000 audit: BPF prog-id=25 op=UNLOAD Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.413000 audit: BPF prog-id=26 op=LOAD Dec 13 03:27:58.413000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecfb54490 a2=94 a3=2 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.413000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.413000 audit: BPF prog-id=26 op=UNLOAD Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit: BPF prog-id=27 op=LOAD Dec 13 03:27:58.493000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecfb54350 a2=40 a3=1 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.493000 audit: BPF prog-id=27 op=UNLOAD Dec 13 03:27:58.493000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.493000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffecfb54420 a2=50 a3=7ffecfb54500 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecfb54360 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecfb54390 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecfb542a0 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecfb543b0 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecfb54390 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecfb54380 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecfb543b0 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecfb54390 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecfb543b0 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecfb54380 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecfb543f0 a2=28 a3=0 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffecfb541a0 a2=50 a3=1 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit: BPF prog-id=28 op=LOAD Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffecfb541a0 a2=94 a3=5 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit: BPF prog-id=28 op=UNLOAD Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffecfb54250 a2=50 a3=1 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffecfb54370 a2=4 a3=38 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.499000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:27:58.499000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecfb543c0 a2=94 a3=6 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:27:58.500000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecfb53b70 a2=94 a3=83 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:27:58.500000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecfb53b70 a2=94 a3=83 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffecfb555b0 a2=10 a3=f1f00800 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffecfb55450 a2=10 a3=3 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffecfb553f0 a2=10 a3=3 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.500000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:27:58.500000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffecfb553f0 a2=10 a3=7 items=0 ppid=2853 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:27:58.516000 audit: BPF prog-id=23 op=UNLOAD Dec 13 03:27:58.547000 audit[3116]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:27:58.547000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcfe985060 a2=0 a3=7ffcfe98504c items=0 ppid=2853 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:27:58.550000 audit[3115]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:27:58.550000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe893c0ce0 a2=0 a3=7ffe893c0ccc items=0 ppid=2853 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.550000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:27:58.551000 audit[3119]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:27:58.551000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcf16deff0 a2=0 a3=7ffcf16defdc items=0 ppid=2853 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.551000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:27:58.553000 audit[3114]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:27:58.553000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc8635e510 a2=0 a3=7ffc8635e4fc items=0 ppid=2853 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:27:58.553000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:27:58.768858 kubelet[2082]: E1213 03:27:58.768635 2082 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:58.781110 kubelet[2082]: E1213 03:27:58.781033 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:27:59.457850 systemd-networkd[1404]: vxlan.calico: Gained IPv6LL Dec 13 03:27:59.782301 kubelet[2082]: E1213 03:27:59.782226 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:00.782935 kubelet[2082]: E1213 03:28:00.782854 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:01.783582 kubelet[2082]: E1213 03:28:01.783562 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:02.784850 kubelet[2082]: E1213 03:28:02.784775 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:03.785399 kubelet[2082]: E1213 03:28:03.785261 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:04.005583 update_engine[1658]: I1213 03:28:04.005467 1658 update_attempter.cc:509] Updating boot flags... Dec 13 03:28:04.786144 kubelet[2082]: E1213 03:28:04.786026 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:05.786383 kubelet[2082]: E1213 03:28:05.786250 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:06.037768 env[1664]: time="2024-12-13T03:28:06.037513489Z" level=info msg="StopPodSandbox for \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\"" Dec 13 03:28:06.037768 env[1664]: time="2024-12-13T03:28:06.037511320Z" level=info msg="StopPodSandbox for \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\"" Dec 13 03:28:06.082619 kubelet[2082]: I1213 03:28:06.082510 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8pvmn" podStartSLOduration=12.584270019 podStartE2EDuration="28.082413074s" podCreationTimestamp="2024-12-13 03:27:38 +0000 UTC" firstStartedPulling="2024-12-13 03:27:40.749125859 +0000 UTC m=+2.301182478" lastFinishedPulling="2024-12-13 03:27:56.24726891 +0000 UTC m=+17.799325533" observedRunningTime="2024-12-13 03:27:57.102801919 +0000 UTC m=+18.654858605" watchObservedRunningTime="2024-12-13 03:28:06.082413074 +0000 UTC m=+27.634469747" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.082 [INFO][3214] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.082 [INFO][3214] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" iface="eth0" netns="/var/run/netns/cni-0db7c419-16d9-e531-cbb9-3079ad3e5c64" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.083 [INFO][3214] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" iface="eth0" netns="/var/run/netns/cni-0db7c419-16d9-e531-cbb9-3079ad3e5c64" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.083 [INFO][3214] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" iface="eth0" netns="/var/run/netns/cni-0db7c419-16d9-e531-cbb9-3079ad3e5c64" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.083 [INFO][3214] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.083 [INFO][3214] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.098 [INFO][3241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" HandleID="k8s-pod-network.aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Workload="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.098 [INFO][3241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.098 [INFO][3241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.109 [WARNING][3241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" HandleID="k8s-pod-network.aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Workload="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.110 [INFO][3241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" HandleID="k8s-pod-network.aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Workload="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.112 [INFO][3241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:28:06.122082 env[1664]: 2024-12-13 03:28:06.118 [INFO][3214] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0" Dec 13 03:28:06.124358 env[1664]: time="2024-12-13T03:28:06.122372086Z" level=info msg="TearDown network for sandbox \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\" successfully" Dec 13 03:28:06.124358 env[1664]: time="2024-12-13T03:28:06.122444050Z" level=info msg="StopPodSandbox for \"aa2a5973616003f2f269db6027ceb82f5a601da50b657747c4b6e7da2c9814d0\" returns successfully" Dec 13 03:28:06.124358 env[1664]: time="2024-12-13T03:28:06.123866929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-82zwk,Uid:44884b3d-9f04-4ed6-b0df-2ae22b77bdd7,Namespace:default,Attempt:1,}" Dec 13 03:28:06.130731 systemd[1]: run-netns-cni\x2d0db7c419\x2d16d9\x2de531\x2dcbb9\x2d3079ad3e5c64.mount: Deactivated successfully. Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.083 [INFO][3215] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.083 [INFO][3215] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" iface="eth0" netns="/var/run/netns/cni-3c426a63-3c04-9685-fdab-d2bd3a1c1063" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.084 [INFO][3215] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" iface="eth0" netns="/var/run/netns/cni-3c426a63-3c04-9685-fdab-d2bd3a1c1063" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.084 [INFO][3215] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" iface="eth0" netns="/var/run/netns/cni-3c426a63-3c04-9685-fdab-d2bd3a1c1063" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.084 [INFO][3215] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.084 [INFO][3215] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.098 [INFO][3242] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" HandleID="k8s-pod-network.1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Workload="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.098 [INFO][3242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.112 [INFO][3242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.119 [WARNING][3242] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" HandleID="k8s-pod-network.1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Workload="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.119 [INFO][3242] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" HandleID="k8s-pod-network.1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Workload="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.123 [INFO][3242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:28:06.131617 env[1664]: 2024-12-13 03:28:06.126 [INFO][3215] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830" Dec 13 03:28:06.133718 env[1664]: time="2024-12-13T03:28:06.132848091Z" level=info msg="TearDown network for sandbox \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\" successfully" Dec 13 03:28:06.133718 env[1664]: time="2024-12-13T03:28:06.132928827Z" level=info msg="StopPodSandbox for \"1ee9c3afb982ce89f0e6558f358a7e02d3c6db78a8a230280c9eb7d693bd7830\" returns successfully" Dec 13 03:28:06.134323 env[1664]: time="2024-12-13T03:28:06.134225027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k69xp,Uid:4aee2773-5ddc-49cc-a39f-e47758e92dae,Namespace:calico-system,Attempt:1,}" Dec 13 03:28:06.140155 systemd[1]: run-netns-cni\x2d3c426a63\x2d3c04\x2d9685\x2dfdab\x2dd2bd3a1c1063.mount: Deactivated successfully. Dec 13 03:28:06.250146 systemd-networkd[1404]: cali4c354c1006a: Link UP Dec 13 03:28:06.315846 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:28:06.315902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4c354c1006a: link becomes ready Dec 13 03:28:06.316037 systemd-networkd[1404]: cali4c354c1006a: Gained carrier Dec 13 03:28:06.316648 systemd-networkd[1404]: cali11d40da4345: Link UP Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.185 [INFO][3284] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-csi--node--driver--k69xp-eth0 csi-node-driver- calico-system 4aee2773-5ddc-49cc-a39f-e47758e92dae 1687 0 2024-12-13 03:27:38 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.80.21 csi-node-driver-k69xp eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali4c354c1006a [] []}} ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.185 [INFO][3284] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.203 [INFO][3314] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" HandleID="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Workload="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.211 [INFO][3314] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" HandleID="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Workload="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000297a00), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.21", "pod":"csi-node-driver-k69xp", "timestamp":"2024-12-13 03:28:06.203714122 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.211 [INFO][3314] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.211 [INFO][3314] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.211 [INFO][3314] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.213 [INFO][3314] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.216 [INFO][3314] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.220 [INFO][3314] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.222 [INFO][3314] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.225 [INFO][3314] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.225 [INFO][3314] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.226 [INFO][3314] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.231 [INFO][3314] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.239 [INFO][3314] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.1/26] block=192.168.115.0/26 handle="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.239 [INFO][3314] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.1/26] handle="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" host="10.67.80.21" Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.239 [INFO][3314] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:28:06.332718 env[1664]: 2024-12-13 03:28:06.239 [INFO][3314] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.1/26] IPv6=[] ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" HandleID="k8s-pod-network.ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Workload="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.333124 env[1664]: 2024-12-13 03:28:06.245 [INFO][3284] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--k69xp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4aee2773-5ddc-49cc-a39f-e47758e92dae", ResourceVersion:"1687", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 27, 38, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"csi-node-driver-k69xp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4c354c1006a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:06.333124 env[1664]: 2024-12-13 03:28:06.246 [INFO][3284] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.1/32] ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.333124 env[1664]: 2024-12-13 03:28:06.246 [INFO][3284] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4c354c1006a ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.333124 env[1664]: 2024-12-13 03:28:06.315 [INFO][3284] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.333124 env[1664]: 2024-12-13 03:28:06.316 [INFO][3284] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--k69xp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4aee2773-5ddc-49cc-a39f-e47758e92dae", ResourceVersion:"1687", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 27, 38, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f", Pod:"csi-node-driver-k69xp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4c354c1006a", MAC:"9e:b6:90:65:d6:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:06.333124 env[1664]: 2024-12-13 03:28:06.332 [INFO][3284] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f" Namespace="calico-system" Pod="csi-node-driver-k69xp" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--k69xp-eth0" Dec 13 03:28:06.337811 env[1664]: time="2024-12-13T03:28:06.337779196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:28:06.337811 env[1664]: time="2024-12-13T03:28:06.337800717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:28:06.337811 env[1664]: time="2024-12-13T03:28:06.337807829Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:28:06.337927 env[1664]: time="2024-12-13T03:28:06.337872626Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f pid=3364 runtime=io.containerd.runc.v2 Dec 13 03:28:06.337000 audit[3370]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:28:06.343658 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali11d40da4345: link becomes ready Dec 13 03:28:06.343697 kernel: kauditd_printk_skb: 507 callbacks suppressed Dec 13 03:28:06.343710 kernel: audit: type=1325 audit(1734060486.337:337): table=filter:69 family=2 entries=34 op=nft_register_chain pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:28:06.344143 systemd-networkd[1404]: cali11d40da4345: Gained carrier Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.185 [INFO][3273] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0 nginx-deployment-6d5f899847- default 44884b3d-9f04-4ed6-b0df-2ae22b77bdd7 1686 0 2024-12-13 03:27:51 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.21 nginx-deployment-6d5f899847-82zwk eth0 default [] [] [kns.default ksa.default.default] cali11d40da4345 [] []}} ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.185 [INFO][3273] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.203 [INFO][3313] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" HandleID="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Workload="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.211 [INFO][3313] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" HandleID="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Workload="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f8590), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"nginx-deployment-6d5f899847-82zwk", "timestamp":"2024-12-13 03:28:06.203615273 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.211 [INFO][3313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.239 [INFO][3313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.239 [INFO][3313] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.243 [INFO][3313] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.252 [INFO][3313] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.262 [INFO][3313] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.267 [INFO][3313] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.272 [INFO][3313] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.272 [INFO][3313] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.276 [INFO][3313] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.286 [INFO][3313] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.296 [INFO][3313] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.2/26] block=192.168.115.0/26 handle="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.296 [INFO][3313] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.2/26] handle="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" host="10.67.80.21" Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.296 [INFO][3313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:28:06.355499 env[1664]: 2024-12-13 03:28:06.296 [INFO][3313] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.2/26] IPv6=[] ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" HandleID="k8s-pod-network.1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Workload="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.355867 env[1664]: 2024-12-13 03:28:06.297 [INFO][3273] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"44884b3d-9f04-4ed6-b0df-2ae22b77bdd7", ResourceVersion:"1686", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 27, 51, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"nginx-deployment-6d5f899847-82zwk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali11d40da4345", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:06.355867 env[1664]: 2024-12-13 03:28:06.297 [INFO][3273] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.2/32] ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.355867 env[1664]: 2024-12-13 03:28:06.297 [INFO][3273] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali11d40da4345 ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.355867 env[1664]: 2024-12-13 03:28:06.343 [INFO][3273] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.355867 env[1664]: 2024-12-13 03:28:06.343 [INFO][3273] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"44884b3d-9f04-4ed6-b0df-2ae22b77bdd7", ResourceVersion:"1686", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 27, 51, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc", Pod:"nginx-deployment-6d5f899847-82zwk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali11d40da4345", MAC:"4e:e6:85:7d:00:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:06.355867 env[1664]: 2024-12-13 03:28:06.354 [INFO][3273] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc" Namespace="default" Pod="nginx-deployment-6d5f899847-82zwk" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--6d5f899847--82zwk-eth0" Dec 13 03:28:06.361209 env[1664]: time="2024-12-13T03:28:06.361181494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:28:06.361209 env[1664]: time="2024-12-13T03:28:06.361200571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:28:06.361290 env[1664]: time="2024-12-13T03:28:06.361210601Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:28:06.361290 env[1664]: time="2024-12-13T03:28:06.361273940Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc pid=3402 runtime=io.containerd.runc.v2 Dec 13 03:28:06.337000 audit[3370]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdaca54250 a2=0 a3=7ffdaca5423c items=0 ppid=2853 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:06.424356 kernel: audit: type=1300 audit(1734060486.337:337): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdaca54250 a2=0 a3=7ffdaca5423c items=0 ppid=2853 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:06.337000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:28:06.573983 kernel: audit: type=1327 audit(1734060486.337:337): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:28:06.574044 kernel: audit: type=1325 audit(1734060486.429:338): table=filter:70 family=2 entries=38 op=nft_register_chain pid=3431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:28:06.429000 audit[3431]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=3431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:28:06.629379 kernel: audit: type=1300 audit(1734060486.429:338): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffdcdf7a90 a2=0 a3=7fffdcdf7a7c items=0 ppid=2853 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:06.429000 audit[3431]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffdcdf7a90 a2=0 a3=7fffdcdf7a7c items=0 ppid=2853 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:06.721487 kernel: audit: type=1327 audit(1734060486.429:338): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:28:06.429000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:28:06.784501 env[1664]: time="2024-12-13T03:28:06.784474959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k69xp,Uid:4aee2773-5ddc-49cc-a39f-e47758e92dae,Namespace:calico-system,Attempt:1,} returns sandbox id \"ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f\"" Dec 13 03:28:06.785164 env[1664]: time="2024-12-13T03:28:06.785147346Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 03:28:06.787288 kubelet[2082]: E1213 03:28:06.787273 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:06.796267 env[1664]: time="2024-12-13T03:28:06.796246601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-82zwk,Uid:44884b3d-9f04-4ed6-b0df-2ae22b77bdd7,Namespace:default,Attempt:1,} returns sandbox id \"1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc\"" Dec 13 03:28:07.649791 systemd-networkd[1404]: cali11d40da4345: Gained IPv6LL Dec 13 03:28:07.787556 kubelet[2082]: E1213 03:28:07.787475 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:07.969867 systemd-networkd[1404]: cali4c354c1006a: Gained IPv6LL Dec 13 03:28:08.333231 env[1664]: time="2024-12-13T03:28:08.333179300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:08.333839 env[1664]: time="2024-12-13T03:28:08.333799764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:08.334529 env[1664]: time="2024-12-13T03:28:08.334483860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:08.335435 env[1664]: time="2024-12-13T03:28:08.335383154Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:08.335682 env[1664]: time="2024-12-13T03:28:08.335639635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 03:28:08.336133 env[1664]: time="2024-12-13T03:28:08.336118296Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 03:28:08.336916 env[1664]: time="2024-12-13T03:28:08.336885334Z" level=info msg="CreateContainer within sandbox \"ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 03:28:08.342036 env[1664]: time="2024-12-13T03:28:08.342017931Z" level=info msg="CreateContainer within sandbox \"ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"98734549849592df7ae28dfc107f5af4a56977d34ebbdb4dec16145940017553\"" Dec 13 03:28:08.342313 env[1664]: time="2024-12-13T03:28:08.342300238Z" level=info msg="StartContainer for \"98734549849592df7ae28dfc107f5af4a56977d34ebbdb4dec16145940017553\"" Dec 13 03:28:08.366949 env[1664]: time="2024-12-13T03:28:08.366905538Z" level=info msg="StartContainer for \"98734549849592df7ae28dfc107f5af4a56977d34ebbdb4dec16145940017553\" returns successfully" Dec 13 03:28:08.788760 kubelet[2082]: E1213 03:28:08.788647 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:09.789524 kubelet[2082]: E1213 03:28:09.789449 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:10.359464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4186366323.mount: Deactivated successfully. Dec 13 03:28:10.789747 kubelet[2082]: E1213 03:28:10.789708 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:11.225167 env[1664]: time="2024-12-13T03:28:11.225085483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:11.225717 env[1664]: time="2024-12-13T03:28:11.225683816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:11.226850 env[1664]: time="2024-12-13T03:28:11.226804386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:11.228101 env[1664]: time="2024-12-13T03:28:11.228054881Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:11.228418 env[1664]: time="2024-12-13T03:28:11.228378923Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 03:28:11.228947 env[1664]: time="2024-12-13T03:28:11.228881456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 03:28:11.229533 env[1664]: time="2024-12-13T03:28:11.229490363Z" level=info msg="CreateContainer within sandbox \"1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 03:28:11.233817 env[1664]: time="2024-12-13T03:28:11.233774648Z" level=info msg="CreateContainer within sandbox \"1cec80adef3167725cfe83681ebbb5aa9ab42452e9aa10158f740a75f9ce18fc\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f787bd223df4ec2361da8a6a479505758966d2008e824ceca0973a27c213e346\"" Dec 13 03:28:11.234030 env[1664]: time="2024-12-13T03:28:11.233971155Z" level=info msg="StartContainer for \"f787bd223df4ec2361da8a6a479505758966d2008e824ceca0973a27c213e346\"" Dec 13 03:28:11.254250 env[1664]: time="2024-12-13T03:28:11.254226224Z" level=info msg="StartContainer for \"f787bd223df4ec2361da8a6a479505758966d2008e824ceca0973a27c213e346\" returns successfully" Dec 13 03:28:11.790026 kubelet[2082]: E1213 03:28:11.789929 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:12.229598 kubelet[2082]: I1213 03:28:12.229396 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-82zwk" podStartSLOduration=16.797381662 podStartE2EDuration="21.22928693s" podCreationTimestamp="2024-12-13 03:27:51 +0000 UTC" firstStartedPulling="2024-12-13 03:28:06.796762052 +0000 UTC m=+28.348818675" lastFinishedPulling="2024-12-13 03:28:11.22866732 +0000 UTC m=+32.780723943" observedRunningTime="2024-12-13 03:28:12.22906715 +0000 UTC m=+33.781123846" watchObservedRunningTime="2024-12-13 03:28:12.22928693 +0000 UTC m=+33.781343609" Dec 13 03:28:12.790316 kubelet[2082]: E1213 03:28:12.790267 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:12.872036 env[1664]: time="2024-12-13T03:28:12.871980067Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:12.872443 env[1664]: time="2024-12-13T03:28:12.872401972Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:12.873096 env[1664]: time="2024-12-13T03:28:12.873055219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:12.874009 env[1664]: time="2024-12-13T03:28:12.873969356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:12.874165 env[1664]: time="2024-12-13T03:28:12.874128333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 03:28:12.874918 env[1664]: time="2024-12-13T03:28:12.874900660Z" level=info msg="CreateContainer within sandbox \"ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 03:28:12.879763 env[1664]: time="2024-12-13T03:28:12.879712369Z" level=info msg="CreateContainer within sandbox \"ce1c2feabdaaa6839992f34a3c83949862e0f744d903cf4ed70c28164128c55f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dc50e54b25faf4bf4a915a457e56245224a09fa4b0b13e44fc406aab97cd91f2\"" Dec 13 03:28:12.879931 env[1664]: time="2024-12-13T03:28:12.879891394Z" level=info msg="StartContainer for \"dc50e54b25faf4bf4a915a457e56245224a09fa4b0b13e44fc406aab97cd91f2\"" Dec 13 03:28:12.902880 env[1664]: time="2024-12-13T03:28:12.902823609Z" level=info msg="StartContainer for \"dc50e54b25faf4bf4a915a457e56245224a09fa4b0b13e44fc406aab97cd91f2\" returns successfully" Dec 13 03:28:12.937124 kubelet[2082]: I1213 03:28:12.937090 2082 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 03:28:12.937265 kubelet[2082]: I1213 03:28:12.937137 2082 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 03:28:13.167733 kubelet[2082]: I1213 03:28:13.167521 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-k69xp" podStartSLOduration=29.078198541 podStartE2EDuration="35.167432424s" podCreationTimestamp="2024-12-13 03:27:38 +0000 UTC" firstStartedPulling="2024-12-13 03:28:06.785023228 +0000 UTC m=+28.337079848" lastFinishedPulling="2024-12-13 03:28:12.874257108 +0000 UTC m=+34.426313731" observedRunningTime="2024-12-13 03:28:13.166948649 +0000 UTC m=+34.719005349" watchObservedRunningTime="2024-12-13 03:28:13.167432424 +0000 UTC m=+34.719489117" Dec 13 03:28:13.790836 kubelet[2082]: E1213 03:28:13.790728 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:14.047000 audit[3600]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.054786 kubelet[2082]: I1213 03:28:14.054771 2082 topology_manager.go:215] "Topology Admit Handler" podUID="33bbb6ec-c06e-4c86-8e76-b9e26415a8e9" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 03:28:14.047000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffeb42bbc50 a2=0 a3=7ffeb42bbc3c items=0 ppid=2308 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.160571 kubelet[2082]: I1213 03:28:14.160560 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnmvr\" (UniqueName: \"kubernetes.io/projected/33bbb6ec-c06e-4c86-8e76-b9e26415a8e9-kube-api-access-pnmvr\") pod \"nfs-server-provisioner-0\" (UID: \"33bbb6ec-c06e-4c86-8e76-b9e26415a8e9\") " pod="default/nfs-server-provisioner-0" Dec 13 03:28:14.160613 kubelet[2082]: I1213 03:28:14.160579 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/33bbb6ec-c06e-4c86-8e76-b9e26415a8e9-data\") pod \"nfs-server-provisioner-0\" (UID: \"33bbb6ec-c06e-4c86-8e76-b9e26415a8e9\") " pod="default/nfs-server-provisioner-0" Dec 13 03:28:14.197623 kernel: audit: type=1325 audit(1734060494.047:339): table=filter:71 family=2 entries=20 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.197651 kernel: audit: type=1300 audit(1734060494.047:339): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffeb42bbc50 a2=0 a3=7ffeb42bbc3c items=0 ppid=2308 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.197670 kernel: audit: type=1327 audit(1734060494.047:339): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.260000 audit[3600]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.260000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeb42bbc50 a2=0 a3=0 items=0 ppid=2308 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.356678 env[1664]: time="2024-12-13T03:28:14.356657979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:33bbb6ec-c06e-4c86-8e76-b9e26415a8e9,Namespace:default,Attempt:0,}" Dec 13 03:28:14.409324 kernel: audit: type=1325 audit(1734060494.260:340): table=nat:72 family=2 entries=22 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.409387 kernel: audit: type=1300 audit(1734060494.260:340): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeb42bbc50 a2=0 a3=0 items=0 ppid=2308 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.409403 kernel: audit: type=1327 audit(1734060494.260:340): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.426849 systemd-networkd[1404]: cali60e51b789ff: Link UP Dec 13 03:28:14.464850 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:28:14.517869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 03:28:14.517921 systemd-networkd[1404]: cali60e51b789ff: Gained carrier Dec 13 03:28:14.521000 audit[3646]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.383 [INFO][3604] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 33bbb6ec-c06e-4c86-8e76-b9e26415a8e9 1748 0 2024-12-13 03:28:14 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.21 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.383 [INFO][3604] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.398 [INFO][3627] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" HandleID="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.406 [INFO][3627] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" HandleID="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000289e70), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 03:28:14.398730823 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.406 [INFO][3627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.406 [INFO][3627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.406 [INFO][3627] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.407 [INFO][3627] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.410 [INFO][3627] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.413 [INFO][3627] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.415 [INFO][3627] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.417 [INFO][3627] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.417 [INFO][3627] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.418 [INFO][3627] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4 Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.422 [INFO][3627] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.425 [INFO][3627] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.3/26] block=192.168.115.0/26 handle="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.425 [INFO][3627] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.3/26] handle="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" host="10.67.80.21" Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.425 [INFO][3627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:28:14.532572 env[1664]: 2024-12-13 03:28:14.425 [INFO][3627] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.3/26] IPv6=[] ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" HandleID="k8s-pod-network.a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.532951 env[1664]: 2024-12-13 03:28:14.426 [INFO][3604] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"33bbb6ec-c06e-4c86-8e76-b9e26415a8e9", ResourceVersion:"1748", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 28, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:14.532951 env[1664]: 2024-12-13 03:28:14.426 [INFO][3604] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.3/32] ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.532951 env[1664]: 2024-12-13 03:28:14.426 [INFO][3604] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.532951 env[1664]: 2024-12-13 03:28:14.518 [INFO][3604] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.533069 env[1664]: 2024-12-13 03:28:14.518 [INFO][3604] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"33bbb6ec-c06e-4c86-8e76-b9e26415a8e9", ResourceVersion:"1748", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 28, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"12:c0:82:a9:d9:29", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:14.533069 env[1664]: 2024-12-13 03:28:14.531 [INFO][3604] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Dec 13 03:28:14.540278 env[1664]: time="2024-12-13T03:28:14.540246330Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:28:14.540278 env[1664]: time="2024-12-13T03:28:14.540267552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:28:14.540278 env[1664]: time="2024-12-13T03:28:14.540274217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:28:14.540385 env[1664]: time="2024-12-13T03:28:14.540337508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4 pid=3665 runtime=io.containerd.runc.v2 Dec 13 03:28:14.521000 audit[3646]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd9315cd90 a2=0 a3=7ffd9315cd7c items=0 ppid=2308 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.671682 kernel: audit: type=1325 audit(1734060494.521:341): table=filter:73 family=2 entries=32 op=nft_register_rule pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.671737 kernel: audit: type=1300 audit(1734060494.521:341): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd9315cd90 a2=0 a3=7ffd9315cd7c items=0 ppid=2308 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.671751 kernel: audit: type=1327 audit(1734060494.521:341): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.728000 audit[3646]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.728000 audit[3646]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9315cd90 a2=0 a3=0 items=0 ppid=2308 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:14.786407 kernel: audit: type=1325 audit(1734060494.728:342): table=nat:74 family=2 entries=22 op=nft_register_rule pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:14.791145 env[1664]: time="2024-12-13T03:28:14.791123313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:33bbb6ec-c06e-4c86-8e76-b9e26415a8e9,Namespace:default,Attempt:0,} returns sandbox id \"a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4\"" Dec 13 03:28:14.791232 kubelet[2082]: E1213 03:28:14.791222 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:14.791805 env[1664]: time="2024-12-13T03:28:14.791791104Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 03:28:14.793000 audit[3698]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3698 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:28:14.793000 audit[3698]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff29ad1b80 a2=0 a3=7fff29ad1b6c items=0 ppid=2853 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:14.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:28:15.791894 kubelet[2082]: E1213 03:28:15.791850 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:16.161536 systemd-networkd[1404]: cali60e51b789ff: Gained IPv6LL Dec 13 03:28:16.792850 kubelet[2082]: E1213 03:28:16.792741 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:16.796699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3953832111.mount: Deactivated successfully. Dec 13 03:28:17.793367 kubelet[2082]: E1213 03:28:17.793317 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:17.946037 env[1664]: time="2024-12-13T03:28:17.945982732Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:17.946593 env[1664]: time="2024-12-13T03:28:17.946547851Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:17.947749 env[1664]: time="2024-12-13T03:28:17.947709227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:17.948523 env[1664]: time="2024-12-13T03:28:17.948481442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:17.949260 env[1664]: time="2024-12-13T03:28:17.949219778Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 03:28:17.950512 env[1664]: time="2024-12-13T03:28:17.950470097Z" level=info msg="CreateContainer within sandbox \"a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 03:28:17.955171 env[1664]: time="2024-12-13T03:28:17.955155696Z" level=info msg="CreateContainer within sandbox \"a797c9ee2b48b83f0c4e367363518a120d4c88f9feb8a7fc774de850f74a0fc4\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"009069c1399034e517723acba0a2a1ca75a5ce0173425794bd2d28e02aa8c71a\"" Dec 13 03:28:17.955474 env[1664]: time="2024-12-13T03:28:17.955431430Z" level=info msg="StartContainer for \"009069c1399034e517723acba0a2a1ca75a5ce0173425794bd2d28e02aa8c71a\"" Dec 13 03:28:17.956996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2031623146.mount: Deactivated successfully. Dec 13 03:28:17.977070 env[1664]: time="2024-12-13T03:28:17.977048160Z" level=info msg="StartContainer for \"009069c1399034e517723acba0a2a1ca75a5ce0173425794bd2d28e02aa8c71a\" returns successfully" Dec 13 03:28:18.180910 kubelet[2082]: I1213 03:28:18.180689 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.022800594 podStartE2EDuration="4.180562616s" podCreationTimestamp="2024-12-13 03:28:14 +0000 UTC" firstStartedPulling="2024-12-13 03:28:14.791662203 +0000 UTC m=+36.343718825" lastFinishedPulling="2024-12-13 03:28:17.94942422 +0000 UTC m=+39.501480847" observedRunningTime="2024-12-13 03:28:18.179965687 +0000 UTC m=+39.732022378" watchObservedRunningTime="2024-12-13 03:28:18.180562616 +0000 UTC m=+39.732619279" Dec 13 03:28:18.195000 audit[3761]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:18.195000 audit[3761]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef751c420 a2=0 a3=7ffef751c40c items=0 ppid=2308 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:18.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:18.211000 audit[3761]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:28:18.211000 audit[3761]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffef751c420 a2=0 a3=7ffef751c40c items=0 ppid=2308 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:18.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:28:18.768382 kubelet[2082]: E1213 03:28:18.768261 2082 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:18.794226 kubelet[2082]: E1213 03:28:18.794121 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:19.795281 kubelet[2082]: E1213 03:28:19.795206 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:20.796518 kubelet[2082]: E1213 03:28:20.796465 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:21.797244 kubelet[2082]: E1213 03:28:21.797124 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:22.798311 kubelet[2082]: E1213 03:28:22.798189 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:23.799163 kubelet[2082]: E1213 03:28:23.799052 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:24.799687 kubelet[2082]: E1213 03:28:24.799563 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:25.800155 kubelet[2082]: E1213 03:28:25.800054 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:26.800762 kubelet[2082]: E1213 03:28:26.800652 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:27.232749 kubelet[2082]: I1213 03:28:27.232693 2082 topology_manager.go:215] "Topology Admit Handler" podUID="2fd0bc27-0dcc-4787-8892-28cd5961bec9" podNamespace="default" podName="test-pod-1" Dec 13 03:28:27.345566 kubelet[2082]: I1213 03:28:27.345488 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-be608849-b095-4c99-8247-41bc9d61c802\" (UniqueName: \"kubernetes.io/nfs/2fd0bc27-0dcc-4787-8892-28cd5961bec9-pvc-be608849-b095-4c99-8247-41bc9d61c802\") pod \"test-pod-1\" (UID: \"2fd0bc27-0dcc-4787-8892-28cd5961bec9\") " pod="default/test-pod-1" Dec 13 03:28:27.345963 kubelet[2082]: I1213 03:28:27.345838 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qzdvk\" (UniqueName: \"kubernetes.io/projected/2fd0bc27-0dcc-4787-8892-28cd5961bec9-kube-api-access-qzdvk\") pod \"test-pod-1\" (UID: \"2fd0bc27-0dcc-4787-8892-28cd5961bec9\") " pod="default/test-pod-1" Dec 13 03:28:27.463000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.490970 kernel: Failed to create system directory netfs Dec 13 03:28:27.491013 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 03:28:27.491035 kernel: audit: type=1400 audit(1734060507.463:346): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.491052 kernel: Failed to create system directory netfs Dec 13 03:28:27.516337 kernel: audit: type=1400 audit(1734060507.463:346): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.463000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.601406 kernel: Failed to create system directory netfs Dec 13 03:28:27.463000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.709891 kernel: audit: type=1400 audit(1734060507.463:346): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.709920 kernel: Failed to create system directory netfs Dec 13 03:28:27.734974 kernel: audit: type=1400 audit(1734060507.463:346): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.463000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.801555 kubelet[2082]: E1213 03:28:27.801501 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:27.463000 audit[3816]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558fdb4805e0 a1=153bc a2=558faea462b0 a3=5 items=0 ppid=872 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:27.463000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:28:28.048586 kernel: audit: type=1300 audit(1734060507.463:346): arch=c000003e syscall=175 success=yes exit=0 a0=558fdb4805e0 a1=153bc a2=558faea462b0 a3=5 items=0 ppid=872 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:28.048621 kernel: audit: type=1327 audit(1734060507.463:346): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.073526 kernel: Failed to create system directory fscache Dec 13 03:28:28.073556 kernel: audit: type=1400 audit(1734060507.928:347): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.073574 kernel: Failed to create system directory fscache Dec 13 03:28:28.155625 kernel: audit: type=1400 audit(1734060507.928:347): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.286175 kernel: Failed to create system directory fscache Dec 13 03:28:28.286236 kernel: audit: type=1400 audit(1734060507.928:347): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.286250 kernel: Failed to create system directory fscache Dec 13 03:28:28.367089 kernel: audit: type=1400 audit(1734060507.928:347): avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.470421 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.517531 kernel: Failed to create system directory fscache Dec 13 03:28:28.517558 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.540890 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.563647 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.585940 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.608356 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.630127 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.651402 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.672201 kernel: Failed to create system directory fscache Dec 13 03:28:27.928000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:27.928000 audit[3816]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558fdb6959c0 a1=4c0fc a2=558faea462b0 a3=5 items=0 ppid=872 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:27.928000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:28:28.712388 kernel: FS-Cache: Loaded Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.773908 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.773940 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.773954 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.792871 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.802121 kubelet[2082]: E1213 03:28:28.802082 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:28.811389 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.829843 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.847913 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.865461 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.882628 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.899614 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.932416 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.932472 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.948155 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.963735 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.979245 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.994338 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.009010 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.023233 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.036949 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.050245 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.063075 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.075543 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.087577 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.098960 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.109893 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.120644 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.131020 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.140982 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.150516 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.159870 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.168847 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.177420 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.185524 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.193420 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.201067 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.208192 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.214857 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.221372 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.227893 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.234402 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.240944 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.247451 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.253982 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.260498 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.266993 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.273533 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.280026 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.286394 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.292686 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.298912 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.305159 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.311426 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.317680 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.323934 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.330153 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.336436 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.342656 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.348872 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.355111 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.361544 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.367783 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.374027 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.380264 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.386486 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.392706 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.398949 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.405195 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.411403 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.417668 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.423896 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.430167 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.436426 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.442643 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.448906 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.455130 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.461395 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.467599 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.473853 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.480085 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.486319 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.492547 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.498775 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.505031 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.511283 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.517558 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.523841 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.530089 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.536350 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.548827 kernel: Failed to create system directory sunrpc Dec 13 03:28:29.548851 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.555067 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.561339 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.567596 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.573806 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.580069 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.586288 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.592531 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.598739 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.604982 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.611198 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.617500 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.623776 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.630013 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.636294 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.642551 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.648789 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.655038 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.661277 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.667536 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.673761 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.680006 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.686239 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.692553 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.698786 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.705042 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.711277 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.717535 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.723764 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.730006 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.736268 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.742543 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.748790 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.755019 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.761272 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.767502 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.773761 kernel: Failed to create system directory sunrpc Dec 13 03:28:28.725000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.800336 kernel: RPC: Registered named UNIX socket transport module. Dec 13 03:28:29.800370 kernel: RPC: Registered udp transport module. Dec 13 03:28:29.800383 kernel: RPC: Registered tcp transport module. Dec 13 03:28:29.802517 kubelet[2082]: E1213 03:28:29.802477 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:29.806610 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 03:28:28.725000 audit[3816]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558fdb6e1ad0 a1=1a7f1c a2=558faea462b0 a3=5 items=6 ppid=872 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:28.725000 audit: CWD cwd="/" Dec 13 03:28:28.725000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:28:28.725000 audit: PATH item=1 name=(null) inode=28408 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:28:28.725000 audit: PATH item=2 name=(null) inode=28408 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:28:28.725000 audit: PATH item=3 name=(null) inode=28409 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:28:28.725000 audit: PATH item=4 name=(null) inode=28408 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:28:28.725000 audit: PATH item=5 name=(null) inode=28410 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:28:28.725000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.854775 kernel: Failed to create system directory nfs Dec 13 03:28:29.854804 kernel: Failed to create system directory nfs Dec 13 03:28:29.854821 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.861389 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.868031 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.874648 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.881255 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.887905 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.894537 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.901140 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.907771 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.914385 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.921022 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.927645 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.934313 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.940950 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.947550 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.954209 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.960831 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.967440 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.974117 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.980718 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.987381 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:29.994012 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.000621 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.007248 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.013896 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.020563 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.027203 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.033923 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.040585 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.047220 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.053849 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.060464 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.067142 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.073793 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.080394 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.087020 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.093653 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.100278 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.106902 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.113506 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.120115 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.126724 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.133175 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.139474 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.145767 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.151933 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.157887 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.163872 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.169811 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.175753 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.181705 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.187632 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.193571 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.199505 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.205468 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.211429 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.217334 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.223280 kernel: Failed to create system directory nfs Dec 13 03:28:29.834000 audit[3816]: AVC avc: denied { confidentiality } for pid=3816 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.249346 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 03:28:29.834000 audit[3816]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558fdb902700 a1=16e97c a2=558faea462b0 a3=5 items=0 ppid=872 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:29.834000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.288520 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.288563 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.288591 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.294831 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.301169 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.307481 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.313771 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.320117 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.326382 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.332723 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.339050 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.345380 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.351685 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.358019 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.364306 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.370625 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.376949 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.383281 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.389606 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.395898 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.402225 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.408521 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.414850 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.421159 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.427498 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.433828 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.440175 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.446514 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.452883 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.459202 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.465520 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.471841 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.478168 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.484505 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.490813 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.497179 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.509861 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.509924 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.516183 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.522557 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.528883 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.535260 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.541597 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.547969 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.554374 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.560728 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.567053 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.573293 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.579329 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.585402 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.591431 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.597507 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.603542 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.609592 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.615616 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.621662 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.627705 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.633724 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.639763 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.645789 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.651831 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.657853 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.663921 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.669936 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.675967 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.681966 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.687977 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.693975 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.699986 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.705963 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.711951 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.717923 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.723919 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.729878 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.735845 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.741830 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.747779 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.753759 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.759717 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.765685 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.771640 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.777596 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.783534 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.789481 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.801420 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.801483 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.802571 kubelet[2082]: E1213 03:28:30.802528 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:30.807408 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.813351 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.819285 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.825241 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.831169 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.837091 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.843049 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.848969 kernel: Failed to create system directory nfs4 Dec 13 03:28:30.266000 audit[3822]: AVC avc: denied { confidentiality } for pid=3822 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.956874 kernel: NFS: Registering the id_resolver key type Dec 13 03:28:30.956902 kernel: Key type id_resolver registered Dec 13 03:28:30.956915 kernel: Key type id_legacy registered Dec 13 03:28:30.266000 audit[3822]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa5006f7010 a1=208de4 a2=55c513d4f2b0 a3=5 items=0 ppid=872 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:30.266000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.984097 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.984121 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.984138 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.990700 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.997299 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.003919 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.010526 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.017133 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.023748 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.030370 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.037018 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.043742 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.050398 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.063775 kernel: Failed to create system directory rpcgss Dec 13 03:28:31.063798 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.077176 kernel: Failed to create system directory rpcgss Dec 13 03:28:31.077239 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.083879 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.090585 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.097212 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.103855 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.110492 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.117146 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.123847 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.130524 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:31.137184 kernel: Failed to create system directory rpcgss Dec 13 03:28:30.967000 audit[3823]: AVC avc: denied { confidentiality } for pid=3823 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:28:30.967000 audit[3823]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f95b5055010 a1=70af4 a2=55a793a152b0 a3=5 items=0 ppid=872 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:30.967000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 03:28:31.319942 nfsidmap[3834]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-687f28f611' Dec 13 03:28:31.326596 nfsidmap[3835]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.6-a-687f28f611' Dec 13 03:28:31.343000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:28:31.343000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:28:31.343000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:28:31.343000 audit[1763]: AVC avc: denied { watch_reads } for pid=1763 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:28:31.343000 audit[1763]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=557231e07e60 a2=10 a3=4b6ed8d1736a631c items=0 ppid=1 pid=1763 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:31.343000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:28:31.343000 audit[1763]: AVC avc: denied { watch_reads } for pid=1763 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:28:31.343000 audit[1763]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=557231e07e60 a2=10 a3=4b6ed8d1736a631c items=0 ppid=1 pid=1763 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:31.343000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:28:31.343000 audit[1763]: AVC avc: denied { watch_reads } for pid=1763 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 03:28:31.343000 audit[1763]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=557231e07e60 a2=10 a3=4b6ed8d1736a631c items=0 ppid=1 pid=1763 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:31.343000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 03:28:31.436306 env[1664]: time="2024-12-13T03:28:31.436159422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2fd0bc27-0dcc-4787-8892-28cd5961bec9,Namespace:default,Attempt:0,}" Dec 13 03:28:31.573136 systemd-networkd[1404]: cali5ec59c6bf6e: Link UP Dec 13 03:28:31.593974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:28:31.594027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 03:28:31.594241 systemd-networkd[1404]: cali5ec59c6bf6e: Gained carrier Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.483 [INFO][3837] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-test--pod--1-eth0 default 2fd0bc27-0dcc-4787-8892-28cd5961bec9 1804 0 2024-12-13 03:28:14 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.21 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.483 [INFO][3837] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.506 [INFO][3861] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" HandleID="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Workload="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.522 [INFO][3861] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" HandleID="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Workload="10.67.80.21-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002957c0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"test-pod-1", "timestamp":"2024-12-13 03:28:31.506057193 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.522 [INFO][3861] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.522 [INFO][3861] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.522 [INFO][3861] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.525 [INFO][3861] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.532 [INFO][3861] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.539 [INFO][3861] ipam/ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.543 [INFO][3861] ipam/ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.547 [INFO][3861] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.547 [INFO][3861] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.550 [INFO][3861] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071 Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.557 [INFO][3861] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.566 [INFO][3861] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.115.4/26] block=192.168.115.0/26 handle="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.566 [INFO][3861] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.4/26] handle="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" host="10.67.80.21" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.566 [INFO][3861] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.566 [INFO][3861] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.115.4/26] IPv6=[] ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" HandleID="k8s-pod-network.f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Workload="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.606167 env[1664]: 2024-12-13 03:28:31.569 [INFO][3837] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2fd0bc27-0dcc-4787-8892-28cd5961bec9", ResourceVersion:"1804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 28, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:31.606930 env[1664]: 2024-12-13 03:28:31.570 [INFO][3837] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.115.4/32] ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.606930 env[1664]: 2024-12-13 03:28:31.570 [INFO][3837] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.606930 env[1664]: 2024-12-13 03:28:31.594 [INFO][3837] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.606930 env[1664]: 2024-12-13 03:28:31.594 [INFO][3837] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2fd0bc27-0dcc-4787-8892-28cd5961bec9", ResourceVersion:"1804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 28, 14, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"92:5e:5a:1d:da:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:28:31.606930 env[1664]: 2024-12-13 03:28:31.605 [INFO][3837] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.21-k8s-test--pod--1-eth0" Dec 13 03:28:31.611717 env[1664]: time="2024-12-13T03:28:31.611653497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:28:31.611717 env[1664]: time="2024-12-13T03:28:31.611675962Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:28:31.611717 env[1664]: time="2024-12-13T03:28:31.611685407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:28:31.611834 env[1664]: time="2024-12-13T03:28:31.611751217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071 pid=3895 runtime=io.containerd.runc.v2 Dec 13 03:28:31.611000 audit[3900]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3900 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:28:31.611000 audit[3900]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffd06ceb250 a2=0 a3=7ffd06ceb23c items=0 ppid=2853 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:28:31.611000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:28:31.638259 env[1664]: time="2024-12-13T03:28:31.638233227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2fd0bc27-0dcc-4787-8892-28cd5961bec9,Namespace:default,Attempt:0,} returns sandbox id \"f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071\"" Dec 13 03:28:31.638910 env[1664]: time="2024-12-13T03:28:31.638897105Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 03:28:31.803565 kubelet[2082]: E1213 03:28:31.803452 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:31.997879 env[1664]: time="2024-12-13T03:28:31.997656946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:31.998540 env[1664]: time="2024-12-13T03:28:31.998525437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:31.999425 env[1664]: time="2024-12-13T03:28:31.999411268Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:32.001040 env[1664]: time="2024-12-13T03:28:32.001008634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:28:32.001563 env[1664]: time="2024-12-13T03:28:32.001512026Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 03:28:32.002692 env[1664]: time="2024-12-13T03:28:32.002638436Z" level=info msg="CreateContainer within sandbox \"f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 03:28:32.007316 env[1664]: time="2024-12-13T03:28:32.007279354Z" level=info msg="CreateContainer within sandbox \"f2eab56ec600d4c574df8a5917a37a535e4f4847c4866d476bf9e535d447d071\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"eb8a2255a48366073057bd7dd63c0ccd90ef07962adfd930beb7548f9ad6d9d0\"" Dec 13 03:28:32.007605 env[1664]: time="2024-12-13T03:28:32.007592004Z" level=info msg="StartContainer for \"eb8a2255a48366073057bd7dd63c0ccd90ef07962adfd930beb7548f9ad6d9d0\"" Dec 13 03:28:32.029003 env[1664]: time="2024-12-13T03:28:32.028975237Z" level=info msg="StartContainer for \"eb8a2255a48366073057bd7dd63c0ccd90ef07962adfd930beb7548f9ad6d9d0\" returns successfully" Dec 13 03:28:32.215698 kubelet[2082]: I1213 03:28:32.215592 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.852584071 podStartE2EDuration="18.215503641s" podCreationTimestamp="2024-12-13 03:28:14 +0000 UTC" firstStartedPulling="2024-12-13 03:28:31.638764069 +0000 UTC m=+53.190820689" lastFinishedPulling="2024-12-13 03:28:32.001683638 +0000 UTC m=+53.553740259" observedRunningTime="2024-12-13 03:28:32.21494754 +0000 UTC m=+53.767004226" watchObservedRunningTime="2024-12-13 03:28:32.215503641 +0000 UTC m=+53.767560308" Dec 13 03:28:32.804178 kubelet[2082]: E1213 03:28:32.804060 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:33.378074 systemd-networkd[1404]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 03:28:33.804389 kubelet[2082]: E1213 03:28:33.804282 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:34.805152 kubelet[2082]: E1213 03:28:34.805043 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:35.805976 kubelet[2082]: E1213 03:28:35.805866 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 03:28:36.806699 kubelet[2082]: E1213 03:28:36.806551 2082 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"